Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
mobile computing
biblio
IoT Based Smart Video Surveillance System Using Convolutional Neural Network
Submitted by
grigby1
on Mon, 01/11/2021 - 12:59pm
camera
captured video
client and server architecture
client-server systems
CNN
COCO dataset
common objects in context dataset
convolutional neural nets
convolutional neural network
crime rate
deep learning
deep video
fully automatic video surveillance systems
image capture
Internet of Things
IoT
IoT based smart video surveillance system
learning (artificial intelligence)
Metrics
microprocessor chips
Mobile Application
mobile computing
MobileNetv2-SSDLite model
object detection
object detection model
police data processing
pubcrawl
Raspberry Pi
resilience
Resiliency
Scalability
Smart video surveillance
SMS notification
video signal processing
video surveillance
Web application
biblio
Application of Differential Privacy in Location Trajectory Big Data
Submitted by
grigby1
on Mon, 12/28/2020 - 11:38am
differential privacy
pubcrawl
composability
Scalability
Resiliency
Human behavior
Algorithm
Big Data
big data privacy
Big Data privacy protection
data privacy
Data protection
differential privacy protection
differential privacy protection technology
Global Positioning System
GPS technology
internet
location based services
location trajectory
location trajectory Big Data
location trajectory privacy protection
Metrics
mobile computing
mobile Internet technology
position trajectory
resilience
social software
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by
grigby1
on Mon, 12/28/2020 - 11:28am
authorisation
security
Servers
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
data privacy
privacy
health care
composability
mobile computing
Computer crime
sensitive information
Security analysis
Data Security
security vulnerability
mobile devices
Privacy Risk
malicious attack
Biomedical monitoring
bluetooth security
Bluetooth networking
Bluetooth pairing process
dieting formula
eating constraint
fitbit
Google Glass
Hacker
health monitor system
health tracker devices
human health parameter monitoring
Jawbone
mobile health
mobile wearable health devices
privacy breach
privacy features
security risk
sensitive data information
user data security
user sleeping arrangements
Wearable devices
biblio
Power Efficient Smart Home with Voice Assistant
Submitted by
grigby1
on Thu, 12/17/2020 - 1:02pm
Adafruit IO
Android application
Arduino IDE
database management systems
domestic appliances
electrical appliances
Electrical products
Fans
fire alarm
Firebase realtime database
flame sensor
Gas detectors
Google firebase application
Home appliances
home automation
Human behavior
Human Factors
IFTTT
mobile computing
mobile robots
NodeMCU
policy-based governance
power efficient smart home
pubcrawl
public domain software
Raspberry Pi
real-time systems
resilience
Resiliency
robot operating systems
security
Smart Home
Smart homes
temperature sensor
Temperature sensors
voice assistant
biblio
Challenges in ROS Forensics
Submitted by
grigby1
on Thu, 12/17/2020 - 12:36pm
availability attacks
communication link
computer network security
confidential security purposes
cyber-physical security threats
Denial-of-Service
Digital Forensics
Forensics
Forensics acquisition and data recovery
Gazbo Turtlebot simulator
Human behavior
Human Factors
integrity attacks
internet
mobile computing
mobile robots
Network connections
network system
operating systems
peer to peer application
Peer-to-peer computing
policy-based governance
pubcrawl
RAT
remote administration tool
resilience
Resiliency
robot behavior
Robot hack
robot hack acquistion
Robot Operating System
robot operating systems
Robot sensing systems
ROS forensics
security
security attacks
Service robots
software tools
Transport Layer Security
biblio
Deep Android Malware Classification with API-Based Feature Graph
Submitted by
grigby1
on Fri, 12/11/2020 - 1:33pm
Analytical models
Android (operating system)
Android malware
Android malware apps
Android malware classification
API features
API-based feature graph classification
application program interfaces
CNN-based classifier
deep learning
feature extraction
Feature Selection
graph theory
hand-refined API-based feature graph
Human behavior
invasive software
malware
Malware Analysis
malware apps
malware class
Mathematical model
Metrics
mobile computing
privacy
pubcrawl
resilience
Resiliency
security
Silicon
structure analysis
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by
grigby1
on Fri, 12/11/2020 - 1:31pm
Analysis of variance
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
graph theory
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide
market-wide malware scanning
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
Robustness
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
biblio
MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks
Submitted by
aekwall
on Mon, 12/07/2020 - 11:09am
neural style transfer
Scalability
Resiliency
Predictive Metrics
pubcrawl
adaptive neural networks
adaptive systems
casual creativity
core technology
creative editing process
creative expression
Creativity
generalized user interface
Image Processing
inherent limitations
Iterative methods
localized editing process
localized image stylization
low-level controls
MaeSTrO
manifold artistic styles
Mobile app
mobile artists
mobile computing
mobile expressive rendering
Mobile handsets
neural nets
Neural networks
neural style transfer techniques
non photorealistic rendering
Painting
particular style transfer
rendering (computer graphics)
style transfer
style transfer orchestration
tools
User control
user interfaces
user tests
biblio
Machine Learning-Driven Trust Prediction for MEC-Based IoT Services
Submitted by
grigby1
on Wed, 12/02/2020 - 1:14pm
alternate direction method of multipliers
Computing Theory
distributed machine-learning architecture
distributed trust prediction model
graph theory
Human behavior
Human Factors
Internet of Things
Internet of Things services
IoT systems
large-scale networked-graphs
learning (artificial intelligence)
machine learning
machine learning-driven trust prediction
machine-learning architecture models
Mathematical model
MEC-based IoT services
MEC-based IoT systems
MEC-environments
mobile computing
Mobile Edge Computing
network Lasso problem
network topology
optimisation
optimization
pattern clustering
Predictive models
pubcrawl
sensor services
simultaneous clustering
Topology
trust
Trusted Computing
trustworthiness
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by
grigby1
on Tue, 12/01/2020 - 3:37pm
feature extraction
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
data structures
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
parallel algorithms
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
GPU-based approach
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
1
2
3
4
5
6
7
8
9
…
next ›
last »