Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Approximation algorithms
biblio
Physical Layer Security Communication of Cognitive UAV Mobile Relay Network
Submitted by grigby1 on Fri, 07/01/2022 - 10:20am
pubcrawl
resilience
simulation
Approximation algorithms
Cognitive Radio Network
physical layer security
Cognitive Radio Security
Unmanned Aerial Vehicles
radio transmitters
Resiliency
relay networks (telecommunication)
mechatronics
average security rate
mobile relay
physical layer secure
unmanned aerial vehicle
biblio
Physical Layer Security Optimization for MIMO Enabled Visible Light Communication Networks
Submitted by aekwall on Tue, 05/10/2022 - 1:45pm
security
simulation
pubcrawl
Scalability
Metrics
Resiliency
Approximation algorithms
light emitting diodes
physical layer security
Transmitters
visible light communication
Iterative methods
multiple-input multiple-output
transceiver design
Visible Light Communications Security
biblio
Density Weighted Diversity Based Query Strategy for Active Learning
Submitted by grigby1 on Tue, 05/03/2022 - 3:56pm
predictability
Training
Security Heuristics
search problems
Scalability
Resiliency
resilience
Representativeness
pubcrawl
active learning
Linear programming
informativeness
Geometry
diversity
density
deep learning
Classification algorithms
Approximation algorithms
biblio
Social Visibility Optimization in OSNs with Anonymity Guarantees: Modeling, Algorithms and Applications
Submitted by grigby1 on Wed, 02/09/2022 - 2:48pm
KMV sketch
anonymity
Approximation algorithms
composability
Computational modeling
Conferences
Data engineering
data structures
Human behavior
Social visibility
Metrics
Probabilistic logic
pubcrawl
resilience
Resiliency
social networking (online)
social networks analysis
biblio
Application of Bio-inspired Algorithms to the Cryptanalysis of Asymmetric Ciphers on the Basis of Composite Number
Submitted by aekwall on Mon, 01/10/2022 - 12:47pm
RSA
Compositionality
Resiliency
quadratic sieve
integer factorization
Genetics
genetic algorithm
fitness function
bio-inspired algorithms
Asymmetric Encryption
Reliability
genetic algorithms
Prototypes
Approximation algorithms
Human behavior
Metrics
pubcrawl
Public key
encryption
biblio
Resilient Vector Consensus in Multi-Agent Networks Using Centerpoints
Submitted by aekwall on Tue, 07/27/2021 - 2:12pm
Computing Theory
resilience
Approximation algorithms
centerpoint
composability
Compositionality
computational geometry
computer science
Computing Theory and Resilience
convergence
fault tolerant networks
Partitioning algorithms
pubcrawl
resilient consensus
Robustness
Two dimensional displays
biblio
PAM PAL: Policy-Aware Virtual Machine Migration and Placement in Dynamic Cloud Data Centers
Submitted by grigby1 on Thu, 07/08/2021 - 2:26pm
Approximation algorithms
virtual machine security
virtual machine
virtual machine migration
Policy-Aware Data Centers
Algorithms
virtual machine placement
optical switches
data centers
Cyber Physical System
Cryptography
Virtual machining
composability
Heuristic algorithms
Resiliency
resilience
pubcrawl
security
Cloud Computing
biblio
On Design of Optimal Smart Meter Privacy Control Strategy Against Adversarial Map Detection
Submitted by grigby1 on Wed, 06/02/2021 - 12:17pm
process control
stochastic optimal control
smart meters
smart meter privacy
Signal processing algorithms
Scalability
Resiliency
resilience
pubcrawl
Approximation algorithms
privacy
optimal control
Markov processes
Markov Decision Process
MAP detection
Human behavior
Control Theory
biblio
An Implementation and Evaluation of a Pairing on Elliptic Curves with Embedding Degree 14
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
exponentiation
pseudo7-sparse algorithm
pairing-based cryptography
multiplication algorithm bases
multiple devices
generation cryptography
Finite filed arithmetic
efficient curves
computer architecture technology
advanced cryptography
Approximation algorithms
Scalability
elliptic curve
Elliptic curves
Elliptic curve cryptography
public key cryptography
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
encryption
biblio
Substitute Model Generation for Black-Box Adversarial Attack Based on Knowledge Distillation
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
deep convolutional neural network
black-box models
adversarial attack perturbation
attacking success rate
black-box adversarial attack
black-box adversarial samples
black-box CNN models
classification mechanism
compact student model
adversarial samples
DenseNet121
knowledge distillation
multiple CNN teacher models
ResNet18
substitute model
substitute model generation
white-box attacking methods
convolutional neural networks
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Computational modeling
Metrics
Training
convolutional neural nets
Task Analysis
black box encryption
image classification
Predictive models
computer vision
Perturbation methods
Approximation algorithms
computer vision tasks
1
2
3
4
next ›
last »