Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Kernel
biblio
Morphological Filter Detector for Image Forensics Applications
Submitted by grigby1 on Thu, 04/08/2021 - 5:14pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Support vector machines
Kernel
feature extraction
image classification
Detectors
image colour analysis
Image forensics
information forensics
Image coding
data compression
Transform coding
Gray-scale
mathematical morphology
Morphology
digital image forensics
binary image compression
binary level documents
deterministic approach
feature extractor
gray level documents
grayscale image compression
image filtering
image forensic identification
image manipulations
media authentication
morphological filter detection
morphological filter detector
noise removal
nonlinear image operators
trained SVM classifier
biblio
A Deep Learning Approach in the Discrete Cosine Transform Domain to Median Filtering Forensics
Submitted by grigby1 on Thu, 04/08/2021 - 5:14pm
learning (artificial intelligence)
Training
feature extraction
CNN
convolution
convolutional neural nets
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
sensor fusion
deep learning
Kernel
Forensics
convolutional neural network
convolutional neural networks
Image forensics
information forensics
signal classification
frequency-domain analysis
discrete cosine transforms
median filters
adaptive filtering layer
AFL
batch normalization operations
classification layer
convolutional stream
discrete cosine transform domain
main frequency range
maxout function
median filtering
median filtering forensics
median filtering manipulation
multiscale convolutional block
multiscale feature fusion strategy
multiscale manipulation features
operational traces
resultant features
Softmax function
biblio
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
Submitted by aekwall on Thu, 04/08/2021 - 4:36pm
malware
Kernel
invasive software
learning (artificial intelligence)
Resiliency
pubcrawl
Ransomware
Cryptography
neural nets
Neural networks
cyber-attacks
Data collection
microsoft windows
Compositionality
ransomware attacks
ransomware detection
artificial neural network
ransomware families
ransomware samples
Information Reuse and Security
discovering novel ransomware families
driven effective ransomware detection scheme
effective artificial neural network structure
global surge
I/O Monitoring
industry-based security researchers
IRP logs
low-level file system
newly found research paradigm
ransomware behavior
ransomware researchers
ransomware samples every day
retail to critical infrastructure
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
composability
computer network management
computer network performance evaluation
computer network reliability
computer network security
Computers
cryptographic algorithm
Cryptography
embedded security protection system
embedded system security protection
embedded systems
graphical management interface
Internet of Things
Internet of Things development
IoT devices
Kernel
log management
Metrics
pubcrawl
Qt graphical management interface
resilience
Resiliency
security management
security management system
security policy management
TCP/IP protocol
TCPIP
transport protocols
Trusted Computing
trusted computing technology
whitelist management
whitelist-based security protection
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
android encryption
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
certificate forging
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
inter-process communication
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
Quadroot
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
biblio
Accurate Deep Net Crowd Counting for Smart IoT Video acquisition devices
Submitted by grigby1 on Mon, 01/11/2021 - 2:01pm
camera characteristics
Cameras
computer architecture
consistency
Crowd density estimation
crowd management tasks
crowdsourcing
deep architecture
deep net crowd counting
Deep Neural Network
deep video
estimation
feature extraction
Internet of Things
Internet of Things cameras
IoT cameras
Kernel
Metrics
neural nets
object detection
pubcrawl
pyramid contextual module
resilience
Resiliency
Robustness
Scalability
security
security system
Self attention network
smart IoT video acquisition devices
video surveillance
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
Adaptation models
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
frequency analysis
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
malicious adversary
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
Scalability
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 12:28pm
computer displays
composability
classification
Artificial Intelligence
Antenna measurements
Computer graphics
confusion matrix
display image capture
electromagnetic emissions
Electromagnetics
F1-score
image classification
Image reconstruction
information security
Kernel
matrix algebra
Monitoring
pattern classification
Predictive Metrics
pubcrawl
Resiliency
security of data
signal processing
Support vector machines
tempest
TEMPEST information security problem
Training
biblio
AMDroid: Android Malware Detection Using Function Call Graphs
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
AMDroid
Android (operating system)
Android Malware Detection
API calls
application program interfaces
countless malicious applications
FCGs
feature extraction
function call graph
function call graphs
graph kernels
graph theory
Human behavior
invasive software
Kernel
learning (artificial intelligence)
machine learning
malware
Malware Analysis
Metrics
mobile internet
mobile operating system
opcode sequences
privacy
pubcrawl
resilience
Resiliency
Semantics
smart phones
static analysis
structural semantic learning
biblio
Reinforcement Learning with Budget-Constrained Nonparametric Function Approximation for Opportunistic Spectrum Access
Submitted by grigby1 on Wed, 12/02/2020 - 1:54pm
Acceleration
budget-constrained nonparametric function approximation
budget-constrained sparsification technique
carrier sense multiple access
channel access actions
cognitive radio
congested bands
coupled congestion control
Dictionaries
function approximation
idle slots
intrinsic state-action space
Kernel
Kernel Method
kernel-based reinforcement learning approach
learning (artificial intelligence)
multichannel adversarial radio
opportunistic spectrum access
pubcrawl
Radio frequency
radio spectrum management
Receivers
Reinforcement learning
reinforcement learning-based radio
resilience
Resiliency
Scalability
single-channel carrier-sense multiple-access
state spaces
telecommunication congestion control
1
2
3
4
5
6
7
8
9
…
next ›
last »