Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
running time
biblio
Fast and Efficient Chaos-Based Algorithm for Multimedia Data Encryption
Submitted by grigby1 on Thu, 05/05/2022 - 2:12pm
complexity
efficient encryption
key space
mechatronics
cyber physical system security framework
communication
Algorithm
running time
cyber physical systems
Color
tools
chaos
Streaming media
composability
Correlation
Resiliency
resilience
pubcrawl
encryption
Ciphers
biblio
Deep Learning Approach for Arbitrary Image Style Fusion and Transformation using SANET model
Submitted by aekwall on Mon, 02/01/2021 - 10:45am
impressive artworks
neural style transfer
arbitrary image style fusion
arbitrary image stylization
arbitrary style transformation
arbitrary style-transformation procedures
ASPM
content-image
generated artwork
identity-loss function
ART
real-time applications
real-time fusion
running time
SANET
SANET model
semantic-structure
style characteristics
style-image
neural nets
Conferences
learning (artificial intelligence)
Resiliency
pubcrawl
deep learning
Computational modeling
Shape
optimization
Scalability
machine learning
Market research
convolutional neural networks
computer vision
Predictive Metrics
Image Processing
image fusion
rendering (computer graphics)
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
Scalability
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
microarchitectural security threat
security
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
I-O Systems
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
advanced Memway algorithm
i-o systems security
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme