Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 11:43am
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
DNA and Chaos Based Confusion-Diffusion for Color Image Security
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
image encryption
multimedia files
image pixels
DNA XOR rules
DNA decoding
DNA coding
Diffusion
deoxyribo nucleic acid coding
confusion-diffusion process
Confusion
confused image
column shuffling
colour image encryption
color image security
chaos aided inter-planar row
DNA cryptography
Cryptography
Histograms
chaos
image colour analysis
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
5D Combined Chaotic System for Image Encryption with DNA Encoding and Scrambling
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
DNA cryptography
UACI
tent map
sine map
pixel scrambling
NPCR
logistics map
Henon map
entropy values
DNA scrambling
DNA complementary function
bit scrambling
5D combined chaotic system
5D Chaotic system
DNA encryption
DNA encoding
Cryptography
image sequences
chaotic sequences
image encryption
Histograms
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
security
MLBT evaluation model
particle swarm optimisation
Peer-to-peer computing
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
Scalability
Metrics
security solutions
security threats
Supervisory Control and Data Supervisory Acquisition (SCADA)
telecommunication security
Trusted Computing
VBM2M-C network
vehicular ad hoc networks
vehicular based M2M-C network
XGBoost model
Internet of Things (IoTs)
advsersary node detection
binary particle swarm optimization
Computational modeling
Entropy
entropy based feature engineering
extreme gradient boosting model
false trust
feature extraction
Human behavior
Adversary Models
Internet of Vehi-cles(IoVs)
learning (artificial intelligence)
machine learning
Machine Learning Based Trust (MLBT)
machine learning based trust evaluation model
machine-to-machine (M2M)
machine-to-machine communication
machine-to-machine communications
malicious activity detection
biblio
Noisy Encrypted Image Correction based on Shannon Entropy Measurement in Pixel Blocks of Very Small Size
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
Image Processing
pixel blocks
noisy encrypted image
multimedia security
local Shannon entropy measurement
local entropy
Image reconstruction
image content confidentiality
block-size
blind error localization
forward error correction
Europe
Cryptography
image encryption
Noise measurement
image denoising
statistical analysis
Entropy
Metrics
composability
pubcrawl
Resiliency
encryption
biblio
From Classical to Semi-Quantum Secure Communication
Submitted by grigby1 on Tue, 06/02/2020 - 10:55am
quantum communication
user-tuneable parameter
semiquantum secure communication
security
secure key distribution
Scalability
Resiliency
resilience
Qubit
Quantum mechanics
quantum cryptography
quantum communication resources
classical secure communication
Q measurement
pubcrawl
Protocols
policy-based governance
novel QKD protocol
Metrics
information theoretic security analysis
information theoretic security
Human Factors
Human behavior
Entropy
biblio
Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 2:54pm
internet
Scalability
safety hazard
Resiliency
resilience
rapidly volatile attacks
pubcrawl
network security
Named Data Network Security
named data network
malicious interest packets
IP-based networks
IP networks
Internet architecture
Bandwidth
information-centric networking
IFA countermeasures
IFA attackers
Human behavior
Fluctuations
Flooding Attacks
Entropy
DoS attacks
detection accuracy
computer network security
computer architecture
channel capacity
biblio
Learning Light-Weight Edge-Deployable Privacy Models
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
anonymization framework
privacy models and measurement
sequential anonymization approach
nonPC devices
model learning
light-weight edge-deployable privacy models
light-weight data anonymization
deployable models
data-driven applications
data schema
anonymized data
data privacy
Internet-of-Things devices
Lattices
Measurement
Entropy
internet
Metrics
Computational modeling
privacy
pubcrawl
Data models
biblio
Learning Light-Weight Edge-Deployable Privacy Models
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
anonymization framework
privacy models and measurement
sequential anonymization approach
nonPC devices
model learning
light-weight edge-deployable privacy models
light-weight data anonymization
deployable models
data-driven applications
data schema
anonymized data
data privacy
Internet-of-Things devices
Lattices
Measurement
Entropy
internet
Metrics
Computational modeling
privacy
pubcrawl
Data models
biblio
Convolutional Neural Network based Foreground Segmentation for Video Surveillance Systems
Submitted by aekwall on Mon, 04/13/2020 - 9:28am
Biological system modeling
video surveillance systems
video sequences
upsampled feature mask
static foreground object
image sequences
illumination changes
ground truth
foreground segmentation methods
foreground segmentation algorithm
Foreground segmentation
extracted feature maps
dynamic backgrounds
constructed foreground mask
Change detection algorithms
Change detection
Kernel
computer vision
video surveillance system
video surveillance
object detection
interpolation
image segmentation
Entropy
convolutional neural network
convolutional neural nets
CNN
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »