Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trajectory
biblio
A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Trajectory
vehicular communications
vehicular ad hoc network
trusted third party authorities
Sybil attack detection scheme
safety-related services
multistep verification process
multiple forged identities
deep learning based object detection technique
Advanced Driving Assistant System
ADAS sensors
V2V
Laser radar
driver information systems
Sensor Systems
Autonomous Driving
road safety
object detection
sensors
VANET
telecommunication computing
sybil attacks
Metrics
vehicular ad hoc networks
Global Positioning System
Sybil attack
composability
pubcrawl
Resiliency
learning (artificial intelligence)
telecommunication security
biblio
Comparison of Location Privacy Protection Schemes in VANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:39pm
VANET
manet privacy
special mobile ad hoc network
road traffic.
malicious node attacks
location privacy protection schemes
trajectory privacy
Probability distribution
road traffic
Trajectory
vehicular ad-hoc networks
privacy protection
Compositionality
data privacy
Correlation
Metrics
Wireless communication
vehicular ad hoc networks
VANETs
Roads
privacy
location privacy
pubcrawl
Resiliency
Protocols
telecommunication security
biblio
The Roles of E-Government in Healthcare from the Perspective of Structuration Theory
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
Lenses
Trajectory
structuration theory
security
Resiliency
resilience
qualitative methods
public administration
pubcrawl
policy-based governance
Medical services
collaboration
information technology
healthcare services
Healthcare
health care
government policies
Electronic government
e-government concept
E-Government
data analysis
Cybersecurity
biblio
Compositional Abstraction for Networks of Control Systems: A Dissipativity Approach
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
linear control systems
Trajectory
Temporal Logic
system nonlinearities
Symmetric matrices
storage functions
simulation functions
pubcrawl
process control
nonlinear control systems
networks of control systems
matrix algebra
Matrices
linear temporal logic specification
Linear systems
Aerospace electronics
Large-scale systems
interconnection matrix
dissipativity-type properties
dissipativity-type compositional reasoning
dissipativity approach
dissipativity
controller design process
control system synthesis
control system networks
control nonlinearities
Compositionality
compositional scheme
compositional abstraction
Approximate abstractions
biblio
Compositional Construction of Approximate Abstractions of Interconnected Control Systems
Submitted by grigby1 on Mon, 10/05/2020 - 1:59pm
interconnected control systems
Trajectory
Temporal Logic
stability
simulation functions
simulation function
pubcrawl
nonlinear control systems
Lyapunov-like function
Lyapunov methods
linear temporal logic specification
Linear systems
linear control systems
Interconnected Systems
Aerospace electronics
interconnected control system
feedback
externally stabilizable subspaces
controller design process
control system synthesis
continuous time systems
continuous control system
concrete control system
Concrete
Compositionality
compositional construction approximate abstraction
cognition
Approximate abstractions
biblio
Privacy in Feedback: The Differentially Private LQG
Submitted by aekwall on Mon, 09/28/2020 - 12:09pm
CPS
CPS Privacy
trajectory control
state trajectory
optimal feedback control values
malicious advisory
LQR problem
LQG problem
linear-quadratic-Gaussian problem
linear quadratic Gaussian control
interacting agents
infinite-horizon linear-quadratic-regulator problems
feedback privacy
Feedback loop
cloud computer
Cloud Computing
numerical simulation
numerical analysis
optimal control
Trajectory
Sensitivity
Dynamical Systems
Human Factors
cyber physical systems
feedback
privacy
pubcrawl
Human behavior
cyber-physical systems
data privacy
biblio
Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
Incentive mechanism
Computing Theory and Privacy
user payoff
user collaboration incentive mechanism
trajectory privacy
Repeated game
rational users
game analysis
CTPP
continuous query users
collaborative user behaviour
collaborative trajectory privacy preservation
location based services
LBS
Scalability
Trajectory
user privacy
Games
collaboration
Analytical models
query processing
privacy
pubcrawl
Human behavior
Resiliency
game theory
data privacy
Servers
biblio
Symmetries and privacy in control over the cloud: uncertainty sets and side knowledge*
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
cloud
Control Theory and Privacy
uncertainty sets
transformation-based method
side knowledge
control algorithms
Cost function
Transforms
cyber physical systems
set theory
Trajectory
Cloud Computing
privacy protection
control engineering computing
cyber-physical systems
privacy
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Scalability
biblio
Stabilization of Cyber Physical System exposed to a random replay attack modeled by Markov chains
Submitted by aekwall on Tue, 09/08/2020 - 10:00am
linear matrix inequalities
Chained Attacks
stochastic systems
stochastic stabilization
stabilization problem
random replay attack
packet losses
Markovian jump linear system
Markov chains
linear matrix inequality formulation
jumping parameters
communication delays
Numerical stability
Cyber Physical System
computer network security
closed loop systems
closed-loop system
CPS
Trajectory
stability
Linear systems
Markov processes
Stability analysis
delays
pubcrawl
Resiliency
cyber-physical systems
Scalability
biblio
A Semantic k-Anonymity Privacy Protection Method for Publishing Sparse Location Data
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
semantic k-anonymity privacy protection method
privacy disclosure
privacy leaks
privacy protection
pubcrawl
Publishing
resilience
Resiliency
semantic attacks
nonsensitive data
semantic privacy protection
semantic translation
Semantics
sensors
sparse location data
Trajectory
user sensitive information
k-anonymity
anonymous set
attacker
composability
compressed sensing
data privacy
diversity reception
Human behavior
information science
anonymity
location based services
location information
location technology
location-based services
Metrics
missing location data
multiuser compressing sensing method
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »