Assured and Scalable Data Engineering, Center for (CASCADE)

Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

Feature extraction Engineering & Materials Science
Experiments Engineering & Materials Science
Labels Engineering & Materials Science
Learning systems Engineering & Materials Science
Recommender systems Engineering & Materials Science
Semantics Engineering & Materials Science
Data mining Engineering & Materials Science
Visualization Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1993 2019

Adversarially-resistant on-demand topic channels for wireless sensor networks

Behrens, H. W. & Candan, K., Jan 15 2019, Proceedings - 2018 IEEE 37th Symposium on Reliable Distributed Systems, SRDS 2018. IEEE Computer Society, p. 83-92 10 p. 8613956. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2019-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet protocols
Network Security
Network security
Wireless Sensor Networks
Wireless sensor networks

A survey of variational and CNN-based optical flow techniques

Tu, Z., Xie, W., Zhang, D., Poppe, R., Veltkamp, R. C., Li, B. & Yuan, J., Mar 1 2019, In : Signal Processing: Image Communication. 72, p. 9-24 16 p.

Research output: Contribution to journalArticle

Optical flows
Neural networks
Motion estimation
Computer vision
Image processing

Attribute Based Encryption for Information Sharing on Tactical Mobile Networks

Luo, J., Dong, Q., Huang, D. & Kang, M., Jan 2 2019, 2018 IEEE Military Communications Conference, MILCOM 2018. Institute of Electrical and Electronics Engineers Inc., p. 960-965 6 p. 8599802. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2019-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Wireless networks
Access control