Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Gaussian noise
biblio
Dual Image Watermarking using Hessenberg decomposition and RDWT-DCT-SVD in YCbCr color space
Submitted by grigby1 on Thu, 06/22/2023 - 12:45pm
pubcrawl
Human behavior
Metrics
composability
Histograms
Image color analysis
Watermarking
Transform coding
Gaussian noise
Transforms
decomposition
speckle
Discrete Cosine Transform (DCT)
Hessenberg decomposition (HD)
Redundant discrete wavelet transform (RDWT)
YCbCr
biblio
Differential Privacy Online Learning Based on the Composition Theorem
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
Scalability
programming
online learning
Resiliency
Human behavior
pubcrawl
composability
privacy
Prediction algorithms
differential privacy
Learning systems
Gaussian noise
composition theorem
sublinear regret
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
convergence analysis
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
Stochastic processes
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
composability
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
security of data
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
MITM Attack
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
communicating devices
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
error statistics
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
Bluetooth
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
biblio
Bidirectional Information Flow and the Roles of Privacy Masks in Cloud-Based Control
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
Gaussian noise
Control Theory and Privacy
uplink privacy masks
privacy loss
noise levels
linear plant
Gaussian process noise
downlink privacy masks
cloud-based control architecture
cloud-based control
bidirectional information flow
Cloud Computing
privacy-utility trade-off
cyber physical systems
cyber-physical systems
Mutual information
privacy
pubcrawl
Human behavior
Resiliency
data privacy
Scalability
biblio
Dynamic range analysis of one-bit compressive sampling with time-varying thresholds
Submitted by aekwall on Mon, 09/14/2020 - 11:31am
analogue-digital conversion
word length 1.0 bit
uniform quantisers
time-varying thresholds
statistical signal processing
standard deviations
minimum detectable amplitudes
maximum tolerable amplitudes
dynamic range analysis
analogue-to-digital converters
cyber-physical systems
ADC
signal sampling
compressive sampling
Gaussian noise
quantisation (signal)
privacy
composability
pubcrawl
Resiliency
biblio
Countermeasure for Identification of Controlled Data Injection Attacks in Networked Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:22am
countermeasure
Networked Control Systems Security
Transfer functions
System Identification
Networked Control System
man-in-the-middle
malicious agent
link monitoring strategy
linear time-invariant transfer functions
Linear systems
industrial control system
Gaussian noise
data injection attack
security of data
controlled data injection attack identification
Identification
networked control systems
Predictive Metrics
Communication networks
production engineering computing
Industry 4.0
composability
pubcrawl
Resiliency
security
Monitoring