Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Gaussian processes
biblio
Fuzzy Integration of Kernel-Based Gaussian Processes Applied to Anomaly Detection in Nuclear Security
Submitted by grigby1 on Mon, 01/10/2022 - 3:57pm
Kernels
uncertainty
tools
security
Resiliency
resilience
pubcrawl
Predictive models
nuclear security
Metrics
Anomaly Detection
Human behavior
Gaussian processes
Gaussian process
Fuzzy logic
Fuzzy integration
composability
artificial intelligence security
Artificial Intelligence
biblio
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
reputation
weather stations
trustworthiness approach
soft-security feature
self-data trust
reputation-based method
reputation indicators
peer-data trust
Pearson correlation
Meteorology Data
Meteorology
geophysics computing
Gaussian overlap
correlation theory
Autonomous Sensors
Time series analysis
IoT
sensor networks
Gaussian processes
Temperature measurement
sensor fusion
Indexes
trustworthiness
Data mining
Correlation
Peer-to-peer computing
composability
pubcrawl
Trusted Computing
data integrity
security of data
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
Quantized Gaussian Embedding Steganography
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
multivariate Gaussian random variables
variance estimators
universal embedding scheme
testing
stego messages
steganography detection
Steganography
statistical framework
statistical analysis
Random variables
quantized Gaussian embedding steganography
pubcrawl
privacy
Payloads
optimal detector
composability
Metrics
Mathematical model
Image Steganography
Image Processing
Hypothesis testing
generalized adopted statistical model
Gaussian processes
Gaussian embedding method
Gaussian embedding
gaussian distribution
distortion
Detectors
detection error
cost-based steganography
biblio
Secure Sensor Design for Resiliency of Control Systems Prior to Attack Detection
Submitted by grigby1 on Mon, 12/16/2019 - 2:59pm
Markov processes
stochastic systems
stochastic control systems
stochastic control scenarios
sensor outputs
security of data
secure sensor design
Scalability
Resiliency
resilience
Random variables
Radio frequency
pubcrawl
process control
possible attacks
Attack detection
Human behavior
Gaussian processes
Games
game theory
Detectability
defense mechanism
cyber physical systems
Cyber Physical System
Cost function
controlled Gauss-Markov process
Control Theory
control systems
control objectives
biblio
Development and Validation of Numerical Magnetic Force and Torque Model for Magnetically Levitated Actuator
Submitted by aekwall on Mon, 09/30/2019 - 9:08am
magnetically levitated actuator (MLA)
torque model
torque control
Torque
Resiliency
remanence region
remanence
pubcrawl
numerical wrench model
Numerical models
numerical magnetic force and torque model
multiaxis motion
motion decoupling
motion control
MLA
Magnetomechanical effects
actuators
magnetically levitated actuator
magnetic levitation
Magnetic forces
Magnetic flux
Magnetic and coil nodes
Lorentz integral
harmonic model
Gaussian quadrature
Gaussian processes
Force
coordinate transformation
composability
Coils
coil region
biblio
A Consideration of an Efficient Arithmetic Over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography
Submitted by aekwall on Wed, 05/01/2019 - 11:37am
Gaussian processes
Vectors
Scalability
Resiliency
Random access memory
public key cryptography
pubcrawl
Proposals
Metrics
Conferences
finite element analysis
Elliptic curves
elliptic curve pairing cryptography
Elliptic curve cryptography
Cyclic Vector Multiplication Algorithm
cubic extension
Cryptography
biblio
Performance of compressive sensing based energy detection
Submitted by grigby1 on Thu, 08/23/2018 - 10:41am
Resiliency
one-dimensional Gaussian Q-function
privacy
probability
Probability density function
pubcrawl
radio spectrum management
Random variables
resilience
Mathematical model
sample size low
sensing time
signal detection
signal processing
signal-to-noise ratio
spectrum sensing
Stochastic processes
test statistic
CS framework
closed-form expressions
cognitive radio
cognitive radio applications
composability
compressed sensing
compressive ratio
compressive sampling
compressive sensing
central limit theorem
cyber-physical systems
decision variable
detected idle channels
Detectors
energy detection
Gaussian processes
low-complexity approximations
biblio
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption
Submitted by grigby1 on Wed, 02/21/2018 - 12:53pm
Scalability
Human behavior
Human Factors
power engineering computing
privacy
Privacy-preserving
privacy-preserving smart metering system
pubcrawl
resilience
Resiliency
Gaussian processes
Smart Grid Privacy
Smart Metering
smart meters
smart power grids
Transformation
wavelet perturbation algorithm
wavelet transformation
wavelet transforms
WPA
distributed processing
Aggregates
Australia
Cryptography
data aggregation
data privacy
DDP
differential privacy techniques
Distributed databases
distributed differential privacy
aggregate data queries
distributed smart meter data aggregation
ElGamal encryption mechanism
encryption
Fourier perturbation algorithm
Fourier transformation
Fourier transforms
FPA
Gaussian principles
biblio
Embedded Accelerators for Scientific High-Performance Computing: An Energy Study of OpenCL Gaussian Elimination Workloads
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
high-performance supercomputers
ARM processors
Benchmark testing
Supercomputers
Compositionality
CPU
embedded accelerators
embedded systems
Energy Efficiency
Gaussian processes
gpu
graphics processing units
Hardware
high-performance computing
accelerators
HPC
low power devices
Matrices
Metrics
microprocessor chips
OpenCL Gaussian elimination workloads
parallel processing
performance evaluation
power aware computing
pubcrawl
Resiliency
Scientific Computing Security
1
2
3
next ›
last »