Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
estimation
biblio
Sampling Time Adaptive Single-Photon Compressive Imaging
Submitted by aekwall on Mon, 09/14/2020 - 11:30am
field-programmable gate array
time-adaptive sampling method
Time-adaptive sampling
threshold of light intensity estimation accuracy.
single photon compressive imaging
self-adapting adjustment
sampling-time-adaptive single-photon compressive imaging
sampling time
sampling methods
sampling control module
light intensity estimation accuracy
Imaging
image sampling
field programmable gate arrays
compressive sampling
Image reconstruction
Photonics
estimation
Image coding
privacy
composability
pubcrawl
Resiliency
cyber-physical systems
Time measurement
biblio
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
distortion metrics
advanced AI platforms
alternating direction method of multipliers
Bayesian optimization
black-box adversarial attack generation methods
black-box adversarial examples
black-box attacks
BO-ADMM
competitive attack success rates
Convex functions
ADMM solution framework
gradient-free optimization
gradient-free regime
operator splitting method
query complexities
Robust machine learning
zeroth-order optimization
ZO-ADMM
Black Box Security
Complexity theory
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
optimization
security of data
distortion
Perturbation methods
image classification
Bayes methods
image retrieval
black-box adversarial attacks
Measurement
estimation
biblio
Targeted Adversarial Examples for Black Box Audio Systems
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
adversarial perturbations
Black Box Security
white-box attacks
speech-to-text
Speech recognition
gradient methods
gradient estimation
fooling ASR systems
estimation
deep recurrent networks
black-box
black box audio systems
automatic speech recognition systems
audio transcription
audio systems
adversarial generation
security of data
Approximation algorithms
recurrent neural nets
adversarial attack
deep neural networks
Statistics
Sociology
genetic algorithms
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
Task Analysis
biblio
CEPHEID: the infrastructure-less indoor localization using lighting fixtures' acoustic frequency fingerprints
Submitted by aekwall on Mon, 08/03/2020 - 9:16am
CEPHEID scheme
Acoustic Fingerprints
self localization
MLP
infrastructure-less indoor localization
indoor positioning experiments
Indoor Positioning
indoor localization scheme
environmental fingerprint
DNN classifier
discrete electronic components
Computer peripherals
CHEPEID
characteristic flickering pattern
Resiliency
ceiling lighting fixtures
indoor radio
lighting
Discrete Fourier transforms
light emitting diodes
DNN
estimation
Cameras
Mathematical model
wireless sensor networks
composability
pubcrawl
Human behavior
biblio
Simultaneous diagnosis of multiple parametric faults based on differential evolution algorithm
Submitted by aekwall on Mon, 05/18/2020 - 9:48am
fault diagnosis
multiple fault diagnosis
simultaneous diagnosis
multiple parametric faults
multiple abrupt faults diagnosis
multifault parameters estimation
Lipschitz nonlinear system
differential evolution algorithm
differential evolution
fault detection
nonlinear systems
Resiliency
evolutionary computation
Nonlinear system
estimation
Human Factors
cyber physical systems
Statistics
Sociology
optimization
Metrics
pubcrawl
biblio
Detecting Adversary using Windows Digital Artifacts
Submitted by grigby1 on Fri, 04/17/2020 - 10:27am
microsoft windows
XTEC
Windows operating systems
Windows Operating System Security
Windows digital artifacts
third-party sensors
Task Analysis
Shimcache
sensors
security of data
Resiliency
resilience
pubcrawl
Prefetching
Microsoft Windows (operating systems)
advanced persistent threat
Metrics
malicious behaviors
machine learning
learning (artificial intelligence)
Incident Response
History
Forensics Investigation
file execution
estimation
composability
APT
application compatibility cache
adversary detection
biblio
Secure estimation for intelligent connected vehicle systems against sensor attacks
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
Acceleration
Security Risk Estimation
state estimator
sensor attacks
Sensor attack
intelligent control
Intelligent connected vehicles
intelligent connected vehicle system
Channel estimation
closed loop systems
secure estimation
vehicular ad hoc network
telecommunication control
wireless channels
connected vehicles
road vehicles
estimation
Human Factors
Stability analysis
cyber-attacks
Metrics
Wireless communication
Communication system security
vehicular ad hoc networks
telecommunication power management
wireless sensor networks
pubcrawl
Resiliency
telecommunication security
Scalability
biblio
A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert System
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
requirements risks-based testing
testing
test case prioritization
systematic requirements
software requirements
software engineers
software engineering
software components
Software
Security Risk Estimation
security
Scalability
risk-based approaches
risk information
risk estimation process
Resiliency
False Data Detection
regression testing
regression analysis
pubcrawl
program testing
Metrics
Iron
Human Factors
Human behavior
fuzzy set theory
fuzzy expert systems
fuzzy expert system
Expert Systems and Security
expert systems
estimation
Complexity theory
biblio
Methods and Special Processors of Entropy Signal Processing
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
entropy-manipulated signals
Time
theoretical cryptography
theoretical comments
special processors
signal processing
pubcrawl
Program processors
probability
Probabilistic logic
probabilistic entropy
Hardware
estimation
a special processor
entropy signal processing
Entropy
Cryptography
correlation activity
Correlation
Compositionality
composability
Ciphers
cipher signals
cipher signal receivers
and structural complexity
biblio
Consumption Ability Estimation of Distribution System Interconnected with Microgrids
Submitted by aekwall on Mon, 03/02/2020 - 11:36am
power supply quality
Underwater Networks
rationality evaluation
power distribution planning
power distribution economics
Planning
Photovoltaic systems
multiscenario simulation
multimicrogrids
microgrids access plan
microgrid capacity
distribution system interconnection
distribution system design
distribution network planning
consumption ability estimation procedure
distribution networks
Scalability
power quality
estimation
energy management
power generation economics
Microgrids
distributed power generation
distributed generation
simulation
power system interconnection
index system
Metrics
pubcrawl
Resiliency
security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »