Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection error rate reduction
biblio
Deep Learning with Feature Reuse for JPEG Image Steganalysis
Submitted by aekwall on Mon, 11/09/2020 - 12:12pm
J-UNIWARD
32-layer convolutional neural networks
bit per nonzero AC DCT coefficient
bottleneck layers
bpnzAC
conventional SCA-GFR method
detection error rate reduction
feature reuse
Gabor filters
Steganography
JPEG compressed image
JPEG image steganalysis
JPEG steganalysis methods
shared features
weak hidden information
XuNet method
Information Reuse and Security
computer architecture
CNN model
Compositionality
Transform coding
distortion
convolution
discrete cosine transforms
Image coding
data compression
convolutional neural nets
Training
deep learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by grigby1 on Wed, 05/01/2019 - 10:33am
security
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
pubcrawl
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
learning (artificial intelligence)
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
access protocols
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection