Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adaptive optics
biblio
Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes
Submitted by BrandonB on Wed, 05/06/2015 - 9:14am
photon-counting imaging
Optical polarization
Optical security and encryption
optical security method
optically phase encoded QR code
phase coding
photon counting
photon counting imaging
photon-counting encryption
optical masks
photon-counting security tagging
Photonics
robust read out
smart phones
speckle
speckle signature
statistical analysis
image encryption
coherent imaging
commercial Smartphone
Cryptography
decryption
full phase double-random-phase encryption
Huffman codes
Image coding
image compressing
Adaptive optics
iterative Huffman coding
Iterative methods
masks
Nonlinear optics
object authentication
Optical filters
Optical imaging
biblio
Tracking and Abnormal Behavior Detection in Video Surveillance Using Optical Flow and Neural Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:34am
Lucas-Kanade approach
video surveillance
video frames
targets identification
synthesized videos
Streaming media
real time videos
Optical imaging
optical flow
Optical computing
object detection
normal movement
Neural networks
neural network
mixture models
abnormal behavior detection
image sequences
image motion analysis
Gaussian processes
Gaussian Mixture Models
foreground detection with Gaussian mixture model
Foreground Detection
FGMM model
feedforward neural nets
feed forward neural network
Feature Selection
computer vision
chaotic movement
Adaptive optics
biblio
A Formalization of the Security Features of Physical Functions
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
key generation algorithms
Unpredictability
Unclonability
side channels attacks
security features
rudimentary security models
Robustness
quantification tools
PUF
Physics
Physically Unclonable Function (PUF)
physical unclonable functions
physical functions
physical attacks
Noise measurement
manufacturing
Adaptive optics
Integrated optics
integrated circuits
information systems security
Information Leakage
Formal Security Model
fault injection attacks
erroneous computations
Cryptography
cryptographic research
cryptographic devices
cryptographic constructions
context intrinsic physical properties
block ciphers
anticounterfeiting schemes
algorithmic solutions
« first
‹ previous
1
2