Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Kernel
biblio
Accurate Deep Net Crowd Counting for Smart IoT Video acquisition devices
Submitted by grigby1 on Mon, 01/11/2021 - 1:01pm
camera characteristics
Cameras
computer architecture
consistency
Crowd density estimation
crowd management tasks
crowdsourcing
deep architecture
deep net crowd counting
Deep Neural Network
deep video
estimation
feature extraction
Internet of Things
Internet of Things cameras
IoT cameras
Kernel
Metrics
neural nets
object detection
pubcrawl
pyramid contextual module
resilience
Resiliency
Robustness
Scalability
security
security system
Self attention network
smart IoT video acquisition devices
video surveillance
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 11:48am
Adaptation models
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
frequency analysis
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
malicious adversary
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
Scalability
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 11:28am
computer displays
composability
classification
Artificial Intelligence
Antenna measurements
Computer graphics
confusion matrix
display image capture
electromagnetic emissions
Electromagnetics
F1-score
image classification
Image reconstruction
information security
Kernel
matrix algebra
Monitoring
pattern classification
Predictive Metrics
pubcrawl
Resiliency
security of data
signal processing
Support vector machines
tempest
TEMPEST information security problem
Training
biblio
AMDroid: Android Malware Detection Using Function Call Graphs
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
AMDroid
Android (operating system)
Android Malware Detection
API calls
application program interfaces
countless malicious applications
FCGs
feature extraction
function call graph
function call graphs
graph kernels
graph theory
Human behavior
invasive software
Kernel
learning (artificial intelligence)
machine learning
malware
Malware Analysis
Metrics
mobile internet
mobile operating system
opcode sequences
privacy
pubcrawl
resilience
Resiliency
Semantics
smart phones
static analysis
structural semantic learning
biblio
Reinforcement Learning with Budget-Constrained Nonparametric Function Approximation for Opportunistic Spectrum Access
Submitted by grigby1 on Wed, 12/02/2020 - 12:54pm
Acceleration
budget-constrained nonparametric function approximation
budget-constrained sparsification technique
carrier sense multiple access
channel access actions
cognitive radio
congested bands
coupled congestion control
Dictionaries
function approximation
idle slots
intrinsic state-action space
Kernel
Kernel Method
kernel-based reinforcement learning approach
learning (artificial intelligence)
multichannel adversarial radio
opportunistic spectrum access
pubcrawl
Radio frequency
radio spectrum management
Receivers
Reinforcement learning
reinforcement learning-based radio
resilience
Resiliency
Scalability
single-channel carrier-sense multiple-access
state spaces
telecommunication congestion control
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
feature extraction
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
data structures
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
parallel algorithms
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
GPU-based approach
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
cyber security
data plane development kit
DPDK-SRIOV
DPDK-SRIOV.
general hardware platform
Hardware
high-performance network
i-o systems security
I/O requirement
i/o systems security
I/O throughput performance
input-output programs
Kernel
network security testing devices
optimisation
optimization
performance evaluation
performance optimization
physical network card
pubcrawl
Scalability
security of data
SRIOV technology
Switches
Throughput
virtual machines
virtual network
virtual network security tester
virtualisation
Virtualization
virtualized network
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
I-O Systems
i-o systems security
security
azalea unikernel file IO offload
file IO command
file IO result
file organisation
file server
file servers
file system
File systems
input-output programs
Io offload
Kernel
Libraries
Linux
Offloading
operating system kernels
operating systems
operating systems (computers)
pubcrawl
Scalability
software libraries
storage management
Telecommunications
unikernel
unikernel transfers
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
i-o systems security
I-O Systems
security
advanced Memway algorithm
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
microarchitectural security threat
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
Scalability
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
1
2
3
4
5
6
7
8
9
…
next ›
last »