Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
signal processing
biblio
Encryption algorithm based on knight’s tour and n-neighbourhood addition
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
composability
cover images
Cryptography
cyber physical systems
digital images
efficient encryption
encryption
encryption algorithm
image encryption
Image Processing
knight tour matrix
Knight's Tour Problem
Knight’s Tour Matrix
Knight’s Tour Problem (KTP)
KT matrix
matrix algebra
Matrix converters
n-neighborhood addition
n-neighbourhood addition
Partitioning algorithms
pubcrawl
Resiliency
signal processing
Signal processing algorithms
biblio
Development of Decomposition Methods for Empirical Modes Based on Extremal Filtration
Submitted by aekwall on Mon, 02/15/2021 - 3:45pm
Conferences
pubcrawl
Metrics
cyber physical systems
Manganese
Signal processing algorithms
Time-frequency Analysis
Compositionality
signal processing
Approximation algorithms
wavelet transforms
filtration
alternating components
decomposition methods
Empirical mode decomposition
empirical modes decomposition
extremal filtration
extremal filtration method
known components
method development
method distribution
rapid analysis of signals
signal decomposition
simple mathematical basis
Spectral analysis
time-frequency feature
decomposition
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 11:28am
computer displays
composability
classification
Artificial Intelligence
Antenna measurements
Computer graphics
confusion matrix
display image capture
electromagnetic emissions
Electromagnetics
F1-score
image classification
Image reconstruction
information security
Kernel
matrix algebra
Monitoring
pattern classification
Predictive Metrics
pubcrawl
Resiliency
security of data
signal processing
Support vector machines
tempest
TEMPEST information security problem
Training
biblio
Optimized Time-Frequency Processing Dedicated to the Detection of Jamming Attacks on Wi-Fi Communications
Submitted by grigby1 on Fri, 12/11/2020 - 1:42pm
attacks
communication terminal
convolution
IEEE 802.11n Standard
Jamming
jamming signals
Metrics
microsoft windows
OFDM
optimized time-frequency processing
pubcrawl
reception stage
resilience
Resiliency
Scalability
security
signal processing
specific signal processing
telecommunication security
Time Frequency Analysis
Time-frequency Analysis
Wi-Fi communication signals
wireless communication network
Wireless fidelity
wireless LAN
biblio
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
computer network security
IP networks
telecommunication traffic
Kernel
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
matrix algebra
pattern classification
CNN
convolutional neural nets
convolutional neural network
network traffic
deep learning
signal processing
LSTM
Predictive Metrics
Laplace equations
Long short-term memory
Graph Kernel
network flows
Matrix converters
graph Laplacian matrix
attack graphs
dimensionality reduction
graph characterization vectors
graph kernel matrices
graph signal processing
graph similarity measures
graph structures
high-dimensional intrinsic representation
high-dimensional representations
hybrid deep learning models
hybrid deep neural network design
kernel-based similarity embedding vector
long-term information learning
long-term network attack detection
network communication data
real-world network attack datasets
spatial-temporal deep learning
spatiotemporal deep learning
structural similarity information
supervised classification task
temporal communication graph
traffic analysis methods
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
pubcrawl
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
Robustness
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
blind watermarking technique
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
redundant wavelet transform
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
biblio
A New Paradigm for Non-contact Vitals Monitoring using Visible Light Sensing
Submitted by aekwall on Mon, 07/13/2020 - 10:17am
Biomedical monitoring
body contact
body-contact device
body-contact methods
breathing
cardiology
contact-based FDA
Heart beat
Heart rate
heartbeat rates
human subject
human-computer-interaction applications
light signal power
light sources
medical signal processing
Metrics
Monitoring
non-contact vitals monitoring
off-the-shelf light source
Optical sensors
patient monitoring
photodetector
Photodetectors
pneumodynamics
processing unit
pubcrawl
Resiliency
respiration rate
Scalability
signal acquisition
signal processing
signal processing tools
smart health systems
visible light sensing
visible light signal
Visual Light Communications Security
vital signs
VLS-based noncontact
VLS-based noncontact vital signs monitoring system
biblio
Physical-Layer Security of Visible Light Communications with Jamming
Submitted by aekwall on Mon, 07/13/2020 - 10:16am
Entropy
Exponential distribution
free-space optical communication
indoor communication
indoor VLC system
input signal
Jamming
jamming LED
light emitting diodes
Metrics
multiple eavesdroppers
normal distribution
Photodetectors
physical-layer security
PLS scheme
pubcrawl
Radio frequency
Resiliency
Scalability
secrecy rate
security
signal processing
telecommunication security
truncated generalized normal distribution
uniform distribution
visible light communication
visible light communications
Visual Light Communications Security
Wireless communication
biblio
Twitter Opinion Mining and Boosting Using Sentiment Analysis
Submitted by grigby1 on Fri, 05/22/2020 - 1:44pm
Cameras
Data mining
emotions
exclusive entities
Gold
Human behavior
Meta-level
natural language processing
natural language texts
opinion mining
opinions
pattern classification
personal mood
pubcrawl
public conviction
public opinion
resilience
Resiliency
Scalability
sentiment analysis
sentiment proportions
sentiments
signal processing
SNLP
social media
social networking (online)
Synset
Task Analysis
Twitter data
twitter sentiment classification
biblio
Methods and Special Processors of Entropy Signal Processing
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
a special processor
and structural complexity
cipher signal receivers
cipher signals
Ciphers
composability
Compositionality
Correlation
correlation activity
Cryptography
Entropy
entropy signal processing
entropy-manipulated signals
estimation
Hardware
probabilistic entropy
Probabilistic logic
probability
Program processors
pubcrawl
signal processing
special processors
theoretical comments
theoretical cryptography
Time
1
2
3
4
5
next ›
last »