Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
visualization
biblio
Composition of Visual Feature Vector Pattern for Deep Learning in Image Forensics
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
learning (artificial intelligence)
feature extraction
machine learning
CNN
convolution
convolutional neural nets
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Filtering
Scalability
deep learning
image classification
visualization
Image forensics
information forensics
Least squares approximations
Forgery
CNN deep learning
CNN hybrid model
CNN net layer
CNN structure
extraction method
feature vector
forgery image
forgery images
image forensics detection scheme
inception module
least-squares solution
median filter residual
median filtering detection
median filters
residual block
suspicious image
visual feature vector pattern
visualized feature vector patterns
window size
biblio
Automatic Protection Implementation Considering Protection Assessment Method of DER Penetration for Smart Distribution Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:27pm
adaptive systems
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
distributed power generation
power engineering computing
power system security
Smart Grid
smart power grids
Reliability
Load flow
visualization
power supply quality
system reliability
Relays
power generation protection
expert systems
expert system
power generation reliability
hydroelectric power stations
smart grid systems
solar power stations
GUI
graphical user interfaces
Adaptive protection
adaptive rule-based method
automatic protection implementation
bidirectional power flow
DER application
DER penetration
distribution energy resources
Gorontalo sub-system network
graphical user interface
Indonesia
microhydro plant
photovoltaic power systems
plant location
power distribution protection
power distribution reliability
power quality
power system reliability
protection security assessment method
PSA
relay settings
smart distribution network
smart electrical system
solar photovoltaics
biblio
Human-centric Software Engineering for Next Generation Cloud- and Edge-based Smart Living Applications
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
aging
Cloud Computing
data analysis
data analysis applications
data privacy
data visualisation
diverse software usability defects
diversity and inclusion
domain-specific visual models
edge computing
edge computing applications
edge-based smart living applications
edge-based software systems
end user emotions
expert systems
Formal Specification
human computer interaction
Human Factors
human usage patterns
human-centric security
human-centric software engineering
Intelligent sensors
Internet of Things
next generation cloud
next-generation applications
privacy
Privacy Requirements
pubcrawl
Scalability
smart cities
smart city-related data
Smart homes
smart living systems
Software
software activities
software development
software engineering
software requirements engineering
user centred design
user interfaces
visualization
biblio
Hash Retrieval Method for Recaptured Images Based on Convolutional Neural Network
Submitted by aekwall on Mon, 03/29/2021 - 12:08pm
Cryptography
feature extraction
Resiliency
Robustness
Training
convolutional neural network
convolutional neural networks
pubcrawl
visualization
image retrieval
Compositionality
Binary codes
advertising
advertising data processing
hash algorithms
Convolutional codes
AD images
binary hash code output
hash layer
hash retrieval method
hashing method
outdoor advertising market researching
recaptured advertising images
recaptured image retrieval
retrieval performance
retrieving algorithm
biblio
Image Classification using Convolution Neural Network Based Hash Encoding and Particle Swarm Optimization
Submitted by aekwall on Mon, 03/29/2021 - 12:08pm
Classification algorithms
Data models
feature extraction
Resiliency
deep learning
particle swarm optimisation
particle swarm optimization
Training
convolutional neural nets
convolutional neural network
genetic algorithms
image classification
convolution neural network
pubcrawl
Predictive models
visualization
image retrieval
Compositionality
sequential model
file organisation
hash algorithms
TV
Intelligent vehicles
hash encoding
hashing techniques
high-performance image classifier models
Image analysis
inception model
marketing
transfer values
TRV
biblio
A Captcha-Based Graphical Password With Strong Password Space and Usability Study
Submitted by grigby1 on Thu, 03/18/2021 - 2:37pm
alphanumeric symbols
authentication
authorisation
captcha based graphical password
Captcha security
Captcha-based password
captchas
click symbols alphabet
composability
Entropy
Graphical Password
graphical user interfaces
Human behavior
human computer interaction
message authentication
mobile computing
mobile device
password
pubcrawl
smart phones
smartphone
usability
user authentication
user personal information security
visual symbols
visualization
biblio
Locality Guided Neural Networks for Explainable Artificial Intelligence
Submitted by aekwall on Mon, 03/01/2021 - 5:04pm
Scalability
learning (artificial intelligence)
Resiliency
pubcrawl
Neurons
machine learning
CNN
convolutional neural nets
network topology
convolutional neural networks
Topology
visualization
Semantics
xai
deep learning architecture
CIFAR100 dataset
explainable artificial intelligence
AI methods
current deep network architectures
locality guided neural network
self-organising feature maps
Self-organizing feature maps
Self-Organizing Map
training networks
biblio
Response Time Analysis for Explainability of Visual Processing in CNNs
Submitted by aekwall on Mon, 03/01/2021 - 5:03pm
Scalability
learning (artificial intelligence)
Resiliency
pubcrawl
Computational modeling
Grammar
convolutional neural nets
Analytical models
Object recognition
visualization
Syntactics
Semantics
xai
explainable artificial intelligence methods
CNNs
cognitive psychology
conditional computation model
dynamic inference models
early-exit architecture
hierarchical representations
intrascene object-object relationships
model architecture
MSDNet
response times
variable RTs
visual learning tasks
visual processing
biblio
XAI-Driven Explainable Multi-view Game Cheating Detection
Submitted by aekwall on Mon, 03/01/2021 - 5:02pm
Scalability
Task Analysis
Data models
Resiliency
pubcrawl
internet
Games
Predictive models
visualization
Artificial Intelligence
explainable AI
virtual reality
artificial intelligence techniques
computer games
xai
industrial application
AI models
detection framework
explainable artificial intelligence
audience profiles
cheating classifiers
cheating detection
debugging
EMGCD
evidence generation
game health
game industries
illegal automated plugins
model compression
model debugging
multiple game productions
NetEase Games
online game
Online Games
online gaming
online persistent virtual world
player enjoyment
reason generation
trustworthy performance
XAI-driven explainable multiview game cheating detection
biblio
Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images
Submitted by grigby1 on Mon, 02/08/2021 - 2:01pm
3D cover images
AES-256
AES–256
composability
Cryptography
Data Security
edge detected pixels
edge detection
Entropy
Image coding
Image edge detection
LSB embedding
LSB steganography
MAE
mean absolute error
mean square error
mean square error methods
message security
Metrics
MSE
peak signal-to-noise ratio
PSNR
pubcrawl
resilience
Resiliency
Scalability
security
SSIM
Steganography
stereo image processing
structural similarity index measure
Three-dimensional displays
Two dimensional displays
visualization
1
2
3
4
5
6
7
8
9
…
next ›
last »