Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
estimation
biblio
Accurate Deep Net Crowd Counting for Smart IoT Video acquisition devices
Submitted by grigby1 on Mon, 01/11/2021 - 1:01pm
IoT cameras
video surveillance
smart IoT video acquisition devices
Self attention network
security system
security
Scalability
Robustness
Resiliency
resilience
pyramid contextual module
pubcrawl
object detection
neural nets
Metrics
Kernel
camera characteristics
Internet of Things cameras
Internet of Things
feature extraction
estimation
deep video
Deep Neural Network
deep net crowd counting
deep architecture
crowdsourcing
crowd management tasks
Crowd density estimation
consistency
computer architecture
Cameras
biblio
An Augmented Bayesian Reputation Metric for Trustworthiness Evaluation in Consensus-based Distributed Microgrid Energy Management Systems with Energy Storage
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
trust evaluation
Energy storage
control engineering computing
estimation
resilience
distributed control
Consensus
cyber-physical system
microgrid
energy management
agent trustworthiness
augmentation method
augmented Bayesian reputation metric
consensus-based distributed microgrid energy management systems
difficult-to-detect attack patterns
Energy Management System
real-time HIL microgrid testbed
Trustworthiness Evaluation
Measurement
Trusted Computing
Bayes methods
pubcrawl
composability
batteries
multi-agent system
multi-agent systems
Cybersecurity
Cryptography
trustworthiness
power engineering computing
power system security
Indexes
distributed power generation
energy management systems
Microgrids
Attack detection
biblio
Chirp Rate Estimation and micro-Doppler Signatures for Pedestrian Security Radar Systems
Submitted by grigby1 on Fri, 12/11/2020 - 1:41pm
security
radar antennas
radar detection
radar receivers
radar resolution
radar sensors
resilience
Resiliency
saturated accelerograms
Scalability
Radar
security systems
signal classification
Spectrogram
target classification
target detection
Time Frequency Analysis
Time-frequency Analysis
time-frequency domain
high-resolution radar
chirp modulation
chirp rate estimation
chirp rate estimators
CW radar
Doppler radar
estimation
FM radar
FMCW
FMCW radar
Chirp
linear frequency modulated continuous wave
Metrics
micro-Doppler
microDoppler signal analysis
microDoppler signatures
object detection
pedestrian security radar systems
pubcrawl
biblio
Trustworthiness Estimation of Entities within Collective Perception
Submitted by aekwall on Mon, 12/07/2020 - 11:32am
vehicular ad hoc network
vehicles awareness
vehicle shares information
V2X communication
remote vehicle
Misbehavior detection
host vehicle
entities trustworthiness estimation
collective perception information
Collective perception
Bayes filter
vehicle dynamics
data consistency
Radar
Intelligent Transportation Systems
road safety
situational awareness
estimation
sensors
VANET
sensor fusion
trustworthiness
Probabilistic logic
Reliability
vehicular ad hoc networks
composability
pubcrawl
Trusted Computing
telecommunication security
Conferences
biblio
Robot Capability and Intention in Trust-Based Decisions Across Tasks
Submitted by grigby1 on Tue, 12/01/2020 - 12:25pm
Intention
Unmanned Aerial Vehicles
UAV agent
trust-based decisions
trust
Task Analysis
robust trust
robots
Robot Trust
robot intention
robot capability
Resiliency
resilience
pubcrawl
Meteorology
automation
human-subject study
human-robot interaction
Human Robot Collaboration
human mental models
Human Factors
human estimations
Human behavior
estimation
delegation situations
Decision Making
cognitive science
capability
autonomous aerial vehicles
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs
Submitted by grigby1 on Fri, 11/20/2020 - 12:54pm
Jitter
Stochastic Computing Security
worst-case entropy estimation
unpredictable random numbers
thermal noise
Stochastic processes
specific conditional Shannon entropy
RO-based entropy sources
ring oscillator-based entropy sources
Ring Oscillator
randomness
Oscillators
oscillator-based entropy sources
Cryptography
History
estimation
entropy source
entropy evaluation
Entropy
cryptographic system
average conditional Shannon entropy
Scalability
Resiliency
resilience
pubcrawl
security
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 2:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Detection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
Cognitive radio (CR) network
Cognitive Radio Security
yardstick based threshold allocation technique
Yardstick based Threshold Allocation (YTA)
X-graph
unlicensed secondary users
spectrum sensing
spectrum scarcity problem
spectrum access probability
Secondary User (SUs)
Primary User Emulation Attack (PUEA)
Primary User (PU)
ns2
free spectrum
dynamic cognitive radio networks
pubcrawl
radiofrequency interference
primary user emulation attack
emulation
licensed primary user
radio spectrum management
cognitive radio
STEM
resource management
sensors
estimation
Analytical models
telecommunication security
Resiliency
resilience
biblio
Jointly Optimized Target Detection and Tracking Using Compressive Samples
Submitted by aekwall on Mon, 09/14/2020 - 11:30am
compressive samples
tracking algorithm
sparse signals
signal reconstruction
Radar tracking
radar target detection
radar detection
joint target detection
joint performance metric
joint detection and tracking
joint decision and estimation
joint CSP Bayesian approach
high-resolution radar signals
CSP-JDT
Detectors
radar resolution
signal sampling
compressive sampling
compressed sensing
object detection
estimation
target tracking
privacy
composability
pubcrawl
Resiliency
cyber-physical systems
Bayes methods
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »