Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
A Review of Recent Trends on DNA Based Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 12:53pm
Predictive Metrics
SHA
Multi Image Encryption
Medical Image
DNA encoding
DNA cryptography
image encryption
Biomedical imaging
AES
chaos
encoding
encryption
RSA
DNA
Entropy
privacy
Logistics
Cryptography
pubcrawl
Human behavior
Resiliency
security
biblio
Chaos-based Image Encryption using Integer Wavelet Transform
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
wavelet transforms
key-dependent bit scrambling
IWT
Integer Wavelet Transform
image decryption algorithm
hyperchaotic mapping
global bit scrambling
GBS
feebler resistance
DNA-coding based encrypting methods
chaos-based image encryption techniques
bit scrambling
DNA cryptography
Cryptography
cryptanalysis
chaotic map
Image Processing
Histograms
Predictive Metrics
Signal processing algorithms
Entropy
privacy
pubcrawl
Human behavior
Resiliency
encryption
biblio
Encryption of the Images on the Basis of Two Chaotic Systems with the Use of Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
Fuzzy Cryptography
statistical analysis
Scalability
Resiliency
pubcrawl
pseudorandom sequences
Metrics
image encryption system
Image coding
fuzzy logic encryption
Fuzzy logic
security
Entropy
digital cryptography
Cryptography
correlation coefficient
Chaotic systems
Chaotic Mapping
chaotic map
chaotic encryption
chaotic cryptography
chaos
biblio
Improving Chaotic Image Encryption Using Maps with Small Lyapunov Exponents
Submitted by aekwall on Mon, 01/18/2021 - 10:20am
chaotic communication
small Lyapunov exponents
lower bound error
largest Lyapunov exponent
finite precision
chaotic image encryption
chaotic encryption scheme
chaos-based encryption
Shannon entropy
cryptography techniques
Chaotic systems
Lyapunov methods
chaotic cryptography
Scalability
Image Processing
chaos
correlation coefficient
Entropy
Mathematical model
standards
Metrics
pubcrawl
Resiliency
encryption
Cryptography
biblio
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs
Submitted by grigby1 on Fri, 11/20/2020 - 12:54pm
Jitter
Stochastic Computing Security
worst-case entropy estimation
unpredictable random numbers
thermal noise
Stochastic processes
specific conditional Shannon entropy
RO-based entropy sources
ring oscillator-based entropy sources
Ring Oscillator
randomness
Oscillators
oscillator-based entropy sources
Cryptography
History
estimation
entropy source
entropy evaluation
Entropy
cryptographic system
average conditional Shannon entropy
Scalability
Resiliency
resilience
pubcrawl
security
biblio
Hardware Steganography for IP Core Protection of Fault Secured DSP Cores
Submitted by aekwall on Mon, 11/09/2020 - 12:40pm
DSP based IP cores
vendor defined signature
transient fault secured IP cores
signature size
signature free approach
multimedia cores
IP core protection
IP core
high level synthesis
hardware steganography
fault secured DSP cores
Fault secure
entropy value
entropy thresholding
encoding rule
Resiliency
colored interval graph
IP piracy
Steganography
DSP
logic design
digital signal processing chips
Watermarking
industrial property
digital signatures
Entropy
graph theory
policy-based governance
composability
pubcrawl
biblio
Deep Learning Poison Data Attack Detection
Submitted by grigby1 on Wed, 11/04/2020 - 1:15pm
model definitions
variational inference approach
Variational inference
transfer learning
training phase
testing data
system-critical applications
Scalability
Resiliency
resilience
pubcrawl
pre-trained model parameters
poisonous data
poisoned training data
neural nets
network attack
adversarial information
MNIST data
maximum entropy principle
Maximum Entropy method
learning (artificial intelligence)
Human behavior
Entropy
deep neural networks
deep learning poison data attack detection
deep learning
computer network security
CNN model
Bayesian statistic
attacking training data
AI Poisoning
biblio
Cyber physical surveillance system for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:10am
smart automotive industry
Internet of Things
Internet of Vehicles
IoV system
Metrics
novel cyber-physical surveillance system framework
pubcrawl
resilience
Resiliency
Intelligent Transportation Systems
smart connected framework
smart IoV
smart people crowd
Smart Vehicles
smart vehicular crowd
surveillance
vehicular ad hoc networks
Automotive engineering
Intelligent Transportation System
Intelligent sensors
information sharing
Human Factors
Entropy
cyber-physical systems
cyber security mechanism
cyber physical surveillance system
crowded space
crowded place
crowded environment
connected peoples
connected crowd
computer network security
Cloud Computing
biblio
Malware Classification System Based on Machine Learning
Submitted by grigby1 on Thu, 10/29/2020 - 10:11am
malware
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
multifeature selection fusion
Metrics
malware classification system
malware classification
Classification system
machine learning
Libraries
learning (artificial intelligence)
invasive software
Human behavior
high-efficiency automatic classification system
Feature Selection
feature extraction
Entropy
biblio
Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things
Submitted by grigby1 on Mon, 10/05/2020 - 1:11pm
trust metrics
pubcrawl
reputation models
resilience
Resiliency
Scalability
security
service oriented architecture
service-oriented architecture
multimetrics trust
trust model
trust scores
trust worthiness metrics
trust-based security mechanisms
trust-based service oriented architecture
trustworthy service provider selection
uncertainty
Entropy
Analytical Hierarchy
building-blocks
complex multicriteria decision making
Computational modeling
computer theory
decision criteria
Decision Making
EFAHP Model
analytic hierarchy process
entropy-based fuzzy AHP model
entropy-based fuzzy analytic hierarchy process
fuzzy set theory
Human Factors
Internet of Things
Multi-criteria Decision Making
multicriteria decision-making problem
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »