Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Noise measurement
biblio
Physical Adversarial Attacks Against Deep Learning Based Channel Decoding Systems
Submitted by aekwall on Mon, 03/15/2021 - 11:57am
Jamming
wireless security
telecommunication security
Resiliency
pubcrawl
private key cryptography
physical white-box
physical adversarial attacks
Perturbation methods
Noise measurement
Neural networks
modulation
Metrics
learning (artificial intelligence)
white box cryptography
huge success
deep learning channel
deep learning
Decoding
conventional jamming attacks
composability
classical decoding schemes
channel decoding systems
channel decoding
channel coding
black-box adversarial attacks
Artificial Neural Networks
adversarial attacks
biblio
Multi-direction Edge Detection Operator
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
noise rejection ability
wavelet transforms
Transforms
the shear transformation
standards
single-pixel edge images
shear transformation
Sensitivity
security
Scalability
Resiliency
resilience
pubcrawl
noisy images
composability
Noise measurement
multidirection edge detection operator
multi-direction edge detection operator
Metrics
mathematical operators
matched edges
Image edge detection
image denoising
false edges
edge extraction
edge detection
convolution
Computed tomography
biblio
Data Collection from Privacy-Aware Users in the Presence of Social Learning
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
data collector
Control Theory and Privacy
symmetric randomized response strategy
state estimation accuracy
social learning
Social groups
private signal
privacy-preserving data
privacy-aware users
privacy cost
payment mechanism
noisy group signals
informative non-disclosive strategy
generalized majority voting rule
friends
elicited data
Scalability
Bayesian-Nash equilibrium
cyber physical systems
Silicon
Noise measurement
Data collection
cyber-physical systems
privacy
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Data models
Bayes methods
game theory
data privacy
biblio
Exploring Adversaries to Defend Audio CAPTCHA
Submitted by grigby1 on Fri, 09/11/2020 - 11:44am
bots
captchas
CAPTCHA
adversarial audio captcha
adversarial audio datasets
adversarial examples attack
attack accuracy
basic iterative method
BIM
Noise measurement
deepFool
distortion
medium background noise
near-sighted users
single audio captcha
spoken digits
Web-based authentication method
websites
composability
authorisation
machine learning
machine learning algorithms
security
pubcrawl
Human behavior
internet
deep learning
learning (artificial intelligence)
Classification algorithms
neural nets
Speech recognition
deep learning models
Web sites
attack models
handicapped aids
biblio
Extrinsic Information Transfer (EXIT) Analysis for Short Polar Codes
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
iterative decoding
wireless channels
short polar codes
Resiliency
Receivers
pubcrawl
polarized channels
polar codes
parity check codes
Noise measurement
noieseless channels
Mutual information
Metrics
low density parity check codes
coding theory
information theory
information bit
frozen bit
extrinsic information transfer analysis
EXIT chart
error correction codes
Decoding
composability
completely noisy channels
channel coding
channel capacity
5G mobile communication
security
biblio
Audio Based Drone Detection and Identification using Deep Learning
Submitted by aekwall on Mon, 08/03/2020 - 10:17am
drone activities
deep learning techniques
drone detection
Acoustic Fingerprinting
Acoustic Fingerprints
audio recorded samples
audio recording
deep neural network algorithms
Drone
Acoustics
drone audio clips
Drone Audio Dataset
drone identification
flying drones
multiprocedural process
private properties
UAVs
Unmanned Aerial Vehicles
convolutional neural network
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
machine learning
malicious activities
drones
Noise measurement
recurrent neural nets
Recurrent neural networks
Artificial Intelligence
deep learning
audio signal processing
autonomous aerial vehicles
recurrent neural network
biblio
Noisy Encrypted Image Correction based on Shannon Entropy Measurement in Pixel Blocks of Very Small Size
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
Image Processing
pixel blocks
noisy encrypted image
multimedia security
local Shannon entropy measurement
local entropy
Image reconstruction
image content confidentiality
block-size
blind error localization
forward error correction
Europe
Cryptography
image encryption
Noise measurement
image denoising
statistical analysis
Entropy
Metrics
composability
pubcrawl
Resiliency
encryption
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
Composable, Unconditionally Secure Message Authentication without any Secret Key
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
message authentication
secure message authentication
Scalability
Resiliency
resilience
pubcrawl
Protocols
probability
policy-based governance
Noise measurement
Metrics
authentication
information theoretic security
Human Factors
Human behavior
error correction codes
error correction
encoding
Decoding
Cryptography
Cryptographic Protocols
channel coding
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »