Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
estimation
biblio
Real-time Face Tracking in Surveillance Videos on Chips for Valuable Face Capturing
Submitted by aekwall on Wed, 07/07/2021 - 4:58pm
Task Analysis
SoC
real-time systems
surveillance
video surveillance
Videos
estimation
face quality estimation
face recognition
face tracking
Inference algorithms
pubcrawl
Metrics
Resiliency
Human behavior
biblio
Real-time False Data Injection Attack Detection in Connected Vehicle Systems with PDE modeling
Submitted by grigby1 on Wed, 06/30/2021 - 3:22pm
Ghost Vehicle
vehicle dynamics
Resiliency
resilience
pubcrawl
Perturbation methods
partial differential equation
Observers
Mathematical model
Human Factors
Human behavior
Acceleration
false data injection attack
False Data Detection
estimation
detection
Data models
cyber physical systems
connected vehicles
composability
Communication networks
biblio
Privacy-Preserving Correlated Data Publication with a Noise Adding Mechanism
Submitted by grigby1 on Wed, 06/02/2021 - 12:17pm
Control Theory
Correlation
Couplings
Data models
data privacy
estimation
Human behavior
privacy
Probabilistic logic
pubcrawl
resilience
Resiliency
Scalability
biblio
Security-driven Cross-Layer Model Description of a HW/SW Framework for AP MPSoC-based Computing Device
Submitted by grigby1 on Tue, 05/25/2021 - 2:19pm
estimation
standards
security
Resiliency
resilience
pubcrawl
optimization
HW/SW Framework
Hardware
Cross Layer Security
cross-layer
computing device
Computational modeling
composability
automation
attacks
AP MPSoC-based ECU
Adaptation models
biblio
Test Method for Automatic Detection Capability of Civil Aviation Security Equipment Using Bayesian Estimation
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Safety
false alarm rate
security
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
detection rate
information technology
Markov processes
estimation
Monte Carlo methods
belief networks
Bayesian estimation
civil aviation security equipment
prohibited items
biblio
A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theoretic security
stealthy estimation attack
Signaling Game with Evidence
physical system
online digital model
intelligent attackers
estimation theory
digital twin
Data-Integrity Attack
clandestine attack strategies
Chi-square detector
CPSS
defense strategies
Covariance matrices
game-theoretic approach
security of data
state estimation
Predictive Metrics
estimation
Human Factors
Games
control systems
pubcrawl
Resiliency
cyber-physical systems
game theory
Scalability
Monitoring
Detectors
biblio
GeoDA: A Geometric Framework for Black-Box Adversarial Attacks
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
image classification
Robustness
Resiliency
query processing
queries
pubcrawl
Perturbation methods
pattern classification
optimisation
Neural networks
natural image classifiers
minimal perturbation
Metrics
Measurement
mean curvature
Iterative methods
adversarial examples
geometric framework
gaussian distribution
estimation
effective iterative algorithm
Deep Networks
decision boundary
data samples
Covariance matrices
composability
carefully perturbed images
black-box settings
black-box perturbations
black-box attack algorithm
black-box adversarial attacks
black box encryption
biblio
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Submitted by aekwall on Mon, 02/22/2021 - 1:43pm
range queries
uniformly distributed queries
uniform query distribution
support size estimator
skewed query distributions
search-pattern leakage
search tokens
range attack
plaintext values
leakage-abuse attacks
known value reconstruction attacks
known structured encryption schemes
k-NN attack
k-nearest-neighbor queries
first value reconstruction attacks
distribution-agnostic reconstruction attacks
Servers
nearest neighbor search
data distribution
Approximation algorithms
encrypted databases
Histograms
Predictive Metrics
estimation
database management systems
Measurement
Databases
query processing
pubcrawl
nearest neighbour methods
encryption
Cryptography
biblio
Machine Learning Method Based on Stream Homomorphic Encryption Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
Elliptic curve cryptography
stream homomorphic encryption computing
mobile positioning
KNN
k nearest neighbors
computational time
computational resources
\$k\$ nearest neighbors
Homomorphic encryption
data analysis
estimation
Human Factors
security
Mathematical model
Distributed databases
Metrics
pubcrawl
Resiliency
machine learning
nearest neighbour methods
mobile computing
encryption
Cryptography
Scalability
biblio
Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations
Submitted by grigby1 on Fri, 01/15/2021 - 12:13pm
visual artifacts
visual features
Videos
video content
manipulation types
lighting
high quality face editing
facial editing methods
Face2Face
face tracking
face manipulations
face editing algorithms
computer animation
classical computer vision issues
artificial faces
Deepfakes
pubcrawl
DeepFake
computer vision
video signal processing
Face
visualization
Geometry
face recognition
Metrics
estimation
Scalability
Resiliency
resilience
Human Factors
Human behavior
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »