Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication systems
biblio
An Adversarial Perturbation Approach Against CNN-based Soft Biometrics Detection
Submitted by aekwall on Mon, 10/12/2020 - 11:33am
Privacy Threats
Expert Systems and Privacy
unwanted soft biometrics-based identification
subject ethnicity
keystroke dynamics
Gender
daily life consumer electronics
computer vision tasks
CNN-based soft biometrics detection
biometric-based authentication systems
biometric approaches
adversarial stickers
adversarial perturbation approach
authentication systems
sensitive information
Perturbation methods
security of data
computer vision
Human Factors
biometrics (access control)
Data processing
authentication
convolutional neural nets
Neural networks
privacy
deep learning
pubcrawl
Human behavior
learning (artificial intelligence)
data privacy
Scalability
biblio
Strong Password Generation Based On User Inputs
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
popular online password checkers
generated passwords
intricate password patterns
non crackable passwords
password authentication system
password cracking
password cracking attacks
Password entropy
Password generator
existing random password generators
produced passwords
Randomization technique
special characters
Strength checkers
strong password generation
Strong password pattern
brute force attacks
Brute Force Attack
data privacy
internet
message authentication
pubcrawl
Human Factors
policy-based governance
password security
user interfaces
authorisation
authentication systems
authenticity
Auto-generated
Case sensitive words
Combination of numbers
dictionary attack
electronic commerce
biblio
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
Virtual private networks
virtual private networks connections
trustless two-factor authentication
server authentication
security component
secure web service
secure shell protocol
OpenSSH server
blockchain platform
authentication systems
authentication request
authentication purpose
two factor authentication
secret information
Human Factors
security of data
blockchain technology
password
smart contracts
message authentication
authentication
web services
internet
blockchain
bitcoin
pubcrawl
Trusted Party
Cryptographic Protocols
telecommunication security
Servers
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems