Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forgery
biblio
An interpretable fuzzy system in the on-line signature scalable verification
Submitted by aekwall on Mon, 05/03/2021 - 1:14pm
Resiliency
pubcrawl
Databases
Fuzzy sets
fuzzy systems
Scalability
Predictive Metrics
Compositionality
Forgery
scalable verification
interpretability
flexible fuzzy system
Frequency selective surfaces
identity verification
IT systems security
on-line signature
biblio
Forensic Similarity for Digital Images
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
digital images
two-part deep-learning system
three-layer neural network
similarity network
multimedia forensics
manipulation parameter
image patches
forgery detection
forensic trace
forensic similarity decision
forensic similarity approach
editing operation
digital image forensics approach
database consistency verification
convolutional neural network-based feature extractor
camera model
deep learning
Forgery
information forensics
Image forensics
Cameras
Forensics
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolutional neural nets
feature extraction
Training
learning (artificial intelligence)
biblio
Composition of Visual Feature Vector Pattern for Deep Learning in Image Forensics
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
pubcrawl
information forensics
learning (artificial intelligence)
Least squares approximations
least-squares solution
machine learning
median filter residual
median filtering detection
median filters
Metrics
inception module
residual block
resilience
Resiliency
Scalability
suspicious image
visual feature vector pattern
visualization
visualized feature vector patterns
window size
feature vector
CNN deep learning
CNN hybrid model
CNN net layer
CNN structure
convolution
convolutional neural nets
deep learning
extraction method
feature extraction
CNN
Filtering
Forgery
forgery image
forgery images
Human behavior
image classification
Image forensics
image forensics detection scheme
biblio
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification
Submitted by grigby1 on Thu, 04/08/2021 - 5:12pm
invariant image features
Camera Identification
CASIA database
CMOS image sensor-based PUF
CMOS image sensors
digital content creation
digital image forensics
forgery content detection
geometric transformations
image acquisition timestamp
image hash
image processing operations
image tampering problems
Bernoulli random space
perceptual data-device hash
Perceptual Image Hash
PUF-based data-device hash
size 180.0 nm
source camera identification
standard content-preserving manipulations
tamper-resistant random PUF response
tampered image detection
TSMC technology
video footage
video watermarking
object detection
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Forensics
Cameras
digital devices
Image forensics
information forensics
feature extraction
image watermarking
Watermarking
copy protection
Physical Unclonable Function
digital images
integrated circuit modelling
video coding
image capture
Forgery
acquisition device identification
benign content
biblio
Network Attack Detection based on Domain Attack Behavior Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
effective market-oriented products
tools
security protection
Scalability
Resiliency
resilience
real-time systems
pubcrawl
normal attack
network security threats
network security
network attack detection method
log file
Forgery
feature extraction
active directory
domain related attack behavior characteristics
domain intrusion detection system
domain control
domain attack detection rules
Databases
computer network security
Computer hacking
Computer crime
Communication networks
common domain intrusion methods
Chained Attacks
Attack detection
APT attack chain
antivirus software
biblio
Fake Generated Painting Detection Via Frequency Analysis
Submitted by aekwall on Mon, 02/01/2021 - 11:43am
Forgery
Paintings
image forgery detection
frequency analysis
Fourier transform
style transfer
neural style transfer
frequency-domain analysis
Painting
Scalability
Predictive Metrics
testing
Databases
pubcrawl
Resiliency
feature extraction
Support vector machines
biblio
On the Generality of Facial Forgery Detection
Submitted by grigby1 on Fri, 01/15/2021 - 12:14pm
GANnotation
DeepFake
Deepfakes
Face2Face
Forgery
CNN architectures
detection architectures
FaceSwap
facial forgery detection
video streaming
ICface
image forgery detection
MesoNet
multiple spoofing techniques
unseen spoofing techniques
unseen techniques
X2Face
XceptionNet
Resiliency
tools
feature extraction
CNN
convolutional neural nets
pubcrawl
Human behavior
Human Factors
resilience
computer architecture
Scalability
Streaming media
Metrics
Task Analysis
face recognition
convolutional neural networks
object detection
Face
biblio
DeepFake Video Analysis using SIFT Features
Submitted by grigby1 on Fri, 01/15/2021 - 12:11pm
computer vision.
visual information
video clips
video analysis
still images
SIFT features
scale-invariant feature transform
Forgery
Deepfakes
DeepFake video analysis
deepfake analysis
DeepFake algorithms
DeepFake
learning (artificial intelligence)
Transforms
video signal processing
Metrics
neural nets
deep learning
Scalability
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Artificial Intelligence
biblio
A Study on Combating Emerging Threat of Deepfake Weaponization
Submitted by grigby1 on Fri, 01/15/2021 - 12:03pm
Fake image
deepfake detection
audio-visual systems
audios
autoencoders
believable synthetic content
combating emerging threat
deepfake technology
deepfake weaponization
fake content
Information integrity
Fake Video
Forgery
genuine content
low-tech doctored images
Multimedia systems
signature forgery
spatial steganalysis
temporal steganalysis
Scalability
learning (artificial intelligence)
security of data
machine learning
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
deep learning
Medical services
neural nets
resilience
human computer interaction
generative adversarial networks
Videos
Weapons
DeepFake
biblio
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
Mitch approach
web security
tools
Task Analysis
supervised learning techniques
supervised learning technique
sensitive HTTP requests
security of data
Security Heuristics
security
Scalability
Resiliency
pubcrawl
predictability
Black Box Security
Manuals
machine learning solution
machine learning approach
machine learning
learning (artificial intelligence)
internet
HTTP requests
Forgery
CSRF vulnerabilities
cross-site request forgery
Cross Site Request Forgery
Browsers
black-box detection
« first
‹ previous
1
2
3
next ›
last »