Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
voting
biblio
Redactable Blockchain Using Lattice-based Chameleon Hash Function
Submitted by aekwall on Fri, 01/13/2023 - 4:05pm
information security
Scalability
distributed ledger
pubcrawl
Decision Making
Hash functions
Compositionality
Prototypes
voting
chameleon hashing
consensus mechanism
lattice-based cryptography
redactable blockchain
security scalability
biblio
Efficient Distributed Consensus Algorithm For Swarm Robotic
Submitted by aekwall on Thu, 01/05/2023 - 5:07pm
pubcrawl
composability
blockchain
Compositionality
Planning
blockchains
voting
Consensus algorithm
manufacturing
swarm robotics
Swarm Intelligence
distributed consensus algorithm
secured communication
Service robots
Swarm robotics network
biblio
A Graph Neural Network For Assessing The Affective Coherence Of Twitter Graphs
Submitted by grigby1 on Tue, 11/08/2022 - 11:50am
pubcrawl
resilience
Resiliency
Big Data
Task Analysis
graph neural networks
social networking (online)
high dimensional data
Blogs
voting
affective coherency
Linked Data
social graph resiliency
neural network resiliency
biblio
A Threat of Deepfakes as a Weapon on Digital Platform and their Detection Methods
Submitted by grigby1 on Mon, 04/25/2022 - 4:28pm
Weapons
Recurrent Neural Networks(RNNs)
Generative Adversarial Networks(GANs)
Deepfake Detection Challenge(DFDC)
Deep Neural Networks(DNNs)
Convolutional Neural Networks(CNNs)
Forgery
DeepFake
voting
Media
machine learning algorithms
Metrics
History
Scalability
Resiliency
resilience
Human Factors
pubcrawl
Neural networks
biblio
V-CRYPT: A Secure Visual Cryptography System
Submitted by aekwall on Fri, 04/01/2022 - 2:07pm
Predictive Metrics
Scientific Computing Security
voting
visual cryptography
phishing attack
Hacker
election
cryptographic techniques
scientific computing
information management
Image Processing
Compositionality
Complexity theory
Resiliency
pubcrawl
encryption
data privacy
visualization
security
biblio
An Efficient and Effective Blockchain-based Data Aggregation for Voting System
Submitted by grigby1 on Tue, 02/22/2022 - 1:25pm
Metrics
voting
security
Scalability
Resiliency
resilience
pubcrawl
peer-to-peer security
Peer-to-peer computing
Online Information Services
peer to peer security
Human Factors
e-voting
Databases
data aggregation
Charge carrier processes
blockchains
blockchain
automation
biblio
Time and Communication Complexity of Leader Election in Anonymous Networks
Submitted by grigby1 on Tue, 12/21/2021 - 10:16am
ad-hoc networks
anonymous messaging
anonymous networks
Complexity theory
Computational modeling
Conferences
distributed algorithms
Knowledge engineering
Leader Election
network topology
Protocols
pubcrawl
resilience
Resiliency
Scalability
voting
biblio
The Adversarial UFP/UFN Attack: A New Threat to ML-based Fake News Detection Systems?
Submitted by aekwall on Mon, 11/08/2021 - 3:23pm
Support vector machines
computer science
social networking (online)
feature extraction
pubcrawl
privacy
Radio frequency
software engineering
Fake News Detection Systems
Universal False Negative
Universal False Positive
voting
threat vectors
Measurement
biblio
SDN-based Misbehavior Detection System for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:44pm
sybil attacks
vehicular privacy standards
Sybil attack-resistant
Software-Defined Networking paradigm
SDN-based misbehavior Detection system
misbehavior detection systems
Misbehaving Detection Systems
cryptography solutions
context-aware MDS
voting
internal attacks
vehicular networks
Software Defined Networks
standards
computer network security
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Resiliency
software defined networking
Software
security
data privacy
Cryptography
Monitoring
biblio
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
mobile ad hoc networks
voting
security of data
Routing protocols
Routing Protocol
route structure
Resiliency
pubcrawl
pattern clustering
node mobility
network traffics
network securities
monitoring process
Monitoring
mobility management (mobile radio)
mobile ad-hoc network
MANET Attack Detection
Metrics
memory overhead
MANET
malicious node
Intrusion Detection
DRINA Intrusion
Compositionality
clustering protocols
cluster based Intrusion detection planning
cluster
CBIDP
ad-hoc node security
Ad Hoc Network Security
active monitoring node
1
2
next ›
last »