Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Indexes
biblio
Constrained Interval Type-2 Fuzzy Classification Systems for Explainable AI (XAI)
Submitted by aekwall on Mon, 03/01/2021 - 4:01pm
Scalability
Resiliency
pubcrawl
Shape
pattern classification
natural language
Fuzzy logic
fuzzy set theory
Generators
Indexes
Fuzzy sets
Linguistics
Switches
Artificial Intelligence
explainable AI
xai
Intelligent systems
explainable artificial intelligence
classification reliability
Constrained interval type-2
constrained interval type-2 fuzzy classification systems
constrained interval type-2 fuzzy sets
explainable CIT2 classifiers
explainable type-2 fuzzy systems
fuzzy logic systems
inherently interpretable structure
interval type-2 fuzzy logic
IT2
output interval centroid
type-reduction step
biblio
Fast and Secure kNN Query Processing in Cloud Computing
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Cloud Computing
Cryptography
encrypted data
data privacy
Protocols
nearest neighbour methods
pubcrawl
query processing
data structures
Measurement
Indexes
Predictive Metrics
location-based services
location based services
nearest neighbor search
RBF
Geospatial analysis
commercial public clouds
data structure
fast and secure kNN query processing
fast location-based query
FSkNN
geospatial data storage
LSPs
process location-based queries
random Bloom filter
secure index
secure location-based query
secure range query protocol
tracking technology
untrusted cloud
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 12:43pm
Approximate Nearest Neighbour
cluster malware
cluster quality
clustering
Clustering algorithms
clustering technique
computer viruses
Cryptography
fast nearest neighbor search techniques
Fuzzy Hashing
HAC-T
Hierarchical Agglomerative Clustering (HAC)
Indexes
malware
Measurement
nearest neighbor search
nearest neighbour methods
Predictive Metrics
pubcrawl
search problems
security
security analysts
security of data
security operations center operators
similarity digests
standards
threshold based hierarchical agglomerative clustering algorithm
tools
tree-based index
Trend Locality Sensitive Hashing (TLSH)
biblio
MuTrack: Multiparameter Based Indoor Passive Tracking System Using Commodity WiFi
Submitted by grigby1 on Tue, 02/16/2021 - 12:26pm
privacy
pubcrawl
Human behavior
resilience
Resiliency
Indexes
target tracking
Reliability
Compositionality
tracking
Wireless fidelity
wireless LAN
indoor radio
Kalman filters
Data Sanitization
elderly care
WiFi
background clutter signals
Clutter
commodity WiFi devices
conjugate operation
contactless awareness applications
device-free localization-tracking
DFLT system
home security
Hungarian Kalman filter
indoor environment
indoor passive tracking system
low-resolution parameter estimates
multi-dimensional parameters
multidimensional parameters estimator
multiparameter based indoor passive tracking system
MuTrack
parameter estimation
path components
path parameters
Radar tracking
random phase errors
receiving antennas
reference antenna
reliability index
signal sanitization
weak target echoes
WiFi signal
biblio
Image Encryption Using Genetic Algorithm and Bit-Slice Rotation
Submitted by aekwall on Mon, 02/15/2021 - 3:51pm
bit plane rotation
Bit Plane Slice
bit plane slicing
bit-slice rotation
chaotic encryption
composability
Cryptography
cryptography attacks
cyber physical systems
digital image
efficient encryption
encryption
fully encrypted image
Generators
genetic algorithm
genetic algorithms
Genetics
Image coding
image encryption
image encryption algorithms
Indexes
pubcrawl
Resiliency
Sociology
SSIM
structural similarity index measure
biblio
The Capability of Truncated Singular Value Decomposition Method for Through the Wall Microwave Imaging
Submitted by aekwall on Mon, 02/15/2021 - 3:44pm
Frequency measurement
pubcrawl
Wireless communication
Metrics
cyber physical systems
Indexes
Compositionality
microwave imaging
singular value decomposition
electromagnetic wave scattering
identical multiple scatterers
inverse scattering theory.
microwave communication
Microwave theory and techniques
nonidentical multiple scatterers
scattered data
Through the wall imaging
through the wall microwave imaging
truncated singular value decomposition
truncated singular value decomposition method
truncation threshold selection
TSVD methods
decomposition
biblio
Actuator Security Index for Structured Systems
Submitted by aekwall on Mon, 01/25/2021 - 11:51am
actuator security
actuator security index
actuators
Barium
composability
control system security
directed graphs
directed subgraphs
discrete time systems
discrete-time LTI network systems
generic security index
graph-theoretic conditions
Human behavior
Indexes
large scale energy systems
Large-scale systems
Linear systems
Metrics
power system security
pubcrawl
Resiliency
security
Sensor Systems
structured systems
vulnerable actuators
biblio
A Fuzzy String Matching Scheme Resistant to Statistical Attack
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
Bloom filter
Cloud Computing
Cryptography
data structures
Encrypted Cloud Database
encryption
frequency distribution
Fuzzy Cryptography
Fuzzy Query
fuzzy query scheme
fuzzy set theory
fuzzy string matching scheme
Indexes
Metrics
noise vector
pubcrawl
query processing
Resiliency
Resistance
S-BF
Scalability
secure fuzzy query
statistical attack
string matching
vector index
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
Cloud Computing
Scalability
Servers
Keyword search
authorisation
Cryptography
data confidentiality
encryption
data encryption
Resiliency
pubcrawl
Metrics
query processing
Data protection
Fuzzy logic
fuzzy set theory
Indexes
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Fuzzy Keyword Sets
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
biblio
Additive and Subtractive Cuckoo Filters
Submitted by aekwall on Mon, 01/11/2021 - 12:32pm
Scalability
pubcrawl
standards
query processing
data structures
privacy
Indexes
quality of service
Fingerprint recognition
Throughput
Additives
Table lookup
addition operations
additive cuckoo filter
ASCF
Bloom filters
bucket indexes
cuckoo filters
cuckoo hashing
exclusive-OR operation
high-speed lookups
set membership queries
space cost
space efficiency
space inflation
space-efficient data structures
subtraction operations
subtractive cuckoo filter
data deletion
1
2
3
4
5
6
7
8
9
…
next ›
last »