Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image Processing
biblio
Sentimental Style Transfer in Text with Multigenerative Variational Auto-Encoder
Submitted by grigby1 on Fri, 12/11/2020 - 1:54pm
resilience
vae
transfer sentiment values
textual data
text analysis
Text
style-transfer
style
sentimental style transfer
sentiment-transfer
Scalability
Resiliency
audio data
Recurrent neural networks
recurrent neural nets
pubcrawl
neural style transfer
multigenerative variational auto-encoder
Metrics
long short-term memories
learning (artificial intelligence)
Image Processing
generative adversarial network
deep learning
biblio
Analysis of Hyperparameter Tuning in Neural Style Transfer
Submitted by aekwall on Mon, 12/07/2020 - 11:10am
hyperparameter tuning
VGG
style cost
sophisticated synthesised artworks
notable artworks
neural style transfer algorithm
Neural networks
neural nets
Image Processing
hyperparameter tuning analysis
neural style transfer
huge computation power
convolutional neural network
content cost
computer graphics engineers
ART
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks
Submitted by aekwall on Mon, 12/07/2020 - 11:09am
non photorealistic rendering
manifold artistic styles
Mobile app
mobile artists
mobile computing
mobile expressive rendering
Mobile handsets
neural nets
Neural networks
neural style transfer techniques
MaeSTrO
Painting
particular style transfer
rendering (computer graphics)
style transfer
style transfer orchestration
tools
User control
user interfaces
user tests
creative expression
Scalability
Resiliency
Predictive Metrics
pubcrawl
adaptive neural networks
adaptive systems
casual creativity
core technology
creative editing process
neural style transfer
Creativity
generalized user interface
Image Processing
inherent limitations
Iterative methods
localized editing process
localized image stylization
low-level controls
biblio
Attacking Split Manufacturing from a Deep Learning Perspective
Submitted by aekwall on Mon, 11/09/2020 - 12:42pm
integrated circuit split manufacturing
integrated circuit manufacture
Foundries
back-end-of-line parts
BEOL connections
different foundries
FEOL facility
front-end-of-line
image-based features
IP piracy
ISCAS-85benchmarks
layout-level placement
Metals
network-flow attack
security promise
sophisticated deep neural network
vector-based features
neural nets
invasive software
computer architecture
learning (artificial intelligence)
Resiliency
pubcrawl
composability
policy-based governance
deep learning
security of data
manufacturing systems
Capacitance
industrial property
Image Processing
Wires
Layout
Pins
biblio
An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:01am
Routing protocols
Location Privacy in Wireless Networks
wireless multimedia sensor networks
unobservability scheme
Source/Sink Location Anonymity
multimedia processing technique
location privacy scheme
Global Attacks
cross-layer design
Contextual Privacy
Image Processing
Multimedia communication
Compositionality
energy consumption
authentication
delays
Intrusion Detection
multipath routing
telecommunication network routing
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data encryption
security
data privacy
Cryptography
authorisation
biblio
Dealing with Correlation and Sparsity for an Effective Exploitation of the Compressive Processing in Electromagnetic Inverse Problems
Submitted by aekwall on Mon, 09/14/2020 - 11:30am
compressive processing
tomographic microwave
sensing problems
scatterers
particle swarm
Microwave antennas
first order Born approximation
electromagnetic inverse problems
effective exploitation
dielectric profiles
CP
conventional compressive sensing
compressive sensing
Compressive Processing paradigm
cyber-physical systems
Imaging
microwave imaging
inverse scattering
Inverse Problems
compressive sampling
Image reconstruction
compressed sensing
Image Processing
sensors
privacy
composability
pubcrawl
Resiliency
biblio
Palmprint recognition based on ultrasound imaging
Submitted by aekwall on Mon, 08/03/2020 - 9:16am
3D image acquisition
Acoustic Fingerprints
ultrasound system
ultrasound imaging
ultrasound images
ultrasonic imaging
ultrasonic fingerprint sensors
recognition procedure
Recognition accuracy
Image Processing
biometric recognition systems
Biometric Recognition
acoustic coupling
3D imaging
feature extraction
2D palmprint images
palmprint recognition
image sensors
fingerprint identification
Acoustics
Two dimensional displays
Three-dimensional displays
image recognition
composability
pubcrawl
Human behavior
Resiliency
biblio
Protecting the Intellectual Properties of Digital Watermark Using Deep Neural Network
Submitted by grigby1 on Thu, 07/30/2020 - 12:53pm
ip protection
Watermarking
watermark
Speech recognition
security
Resiliency
resilience
pubcrawl
policy-based governance
ownership verification
neural nets
natural language processing
machine learning
learning (artificial intelligence)
Artificial Intelligence
intellectual property security
intellectual property
industrial property
Image Processing
embedding watermarks
embedded
DNN algorithms
Digital Watermark
Deep Neural Network
deep learning models
counter-watermark attacks
composability
biblio
A Business Card Reader Application for iOS devices based on Tesseract
Submitted by aekwall on Mon, 07/27/2020 - 11:21am
online repository
55 digital business cards
BCR application
commercial business card reader application
data detection
high-resolution smartphone camera
Image Processing
iOS devices
mobile phones
ios
open-source OCR engine
optical character recognition
Tesseract
Tesseract OCR
text detection
Text recognition
iOS Security
mobile computing
iOS (operating system)
natural language processing
Compositionality
Human Factors
Engines
Cameras
Optical character recognition software
character recognition
public domain software
smart phones
Business
Metrics
pubcrawl
Resiliency
feature extraction
biblio
Efficient Technique Image Encryption with Cipher Block Chaining and Gingerbreadman Map
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
efficient technique image encryption
unified average change intensity
testing
secure communication
Resiliency
resilience
pubcrawl
pixel change rate
key cipher block chaining
Image Processing
Gingerbreadman map
encryption
button sensitivity
efficient encryption
digital images
digital image security
Digital Image Crypthography
cyber-physical systems
Cryptography
computer science
composability
Ciphers
cipher block chaining
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »