Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trajectory
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 4:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Trajectory Anonymity Based on Quadratic Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 4:33pm
adjacent anonymous area
trajectory anonymous algorithm
trajectory anonymity publishing
synchronous trajectory data
Synchronous trajectory
Sensitive region
quadratic anonymity
privacy information
original Regional anonymity
original location
Location mappings
location mapping
Location area division
K-anonymous
forged location
current sensitive region
Servers
k-anonymity
Trajectory
anonymity
Euclidean distance
Metrics
Perturbation methods
Data protection
computer science
composability
data privacy
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
A Vehicle Trajectory Adversary Model Based on VLPR Data
Submitted by aekwall on Mon, 08/03/2020 - 9:38am
traffic engineering computing
qualified identifier attributes
Resiliency
road average speed
road traffic
road vehicles
Roads
Scalability
target trajectory
pubcrawl
Trajectory
trajectory linking
vehicle information
vehicle license plate recognition data
vehicle suspicion list
vehicle trajectory adversary model
VLPR system
image recognition
Adversary Modeling
Adversary Models
closest time method
Data models
data privacy
desensitized VLPR data
Foshan City VLPR data
Human behavior
adversary model
ITS
Licenses
Metrics
privacy
privacy attacking method
privacy disclosure
privacy protection
biblio
CPS Optimal Control for Interconnected Power Grid Based on Model Predictive Control
Submitted by grigby1 on Thu, 07/16/2020 - 10:56am
power generation control
Trajectory
statistical methods
statistical analysis
standards
simulations
Resiliency
resilience
pubcrawl
Predictive models
predictive control
power system interconnection
power system control
power grids
AGC control strategy
optimal control
model predictive control
Metrics
interconnected power systems
interconnected power grid
frequency control
CPS optimal control
CPS modeling
CPS
control behavior
composability
automatic generation control
biblio
WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables
Submitted by aekwall on Mon, 02/17/2020 - 1:57pm
financial data processing
wearables security
WristSpy
Wearable sensors
single wrist-worn wearable device
personal mobile devices
passcode input scenarios
passcode inference system
parallel PIN inference
parallel pattern inference
multidimensional feature extraction
mobile payment
machine-learning based classification
fine-grained hand movement trajectories
Euclidean distance
wearable computers
Scalability
Pins
Trajectory
Online banking
electronic money
parallel processing
privacy
Mobile handsets
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
mobile computing
authorisation
biblio
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach
Submitted by aekwall on Mon, 12/09/2019 - 11:23am
financial markets theory
wireless sensor networks
Trusted Computing
trust diversification
Trajectory
telecommunication computing
spatially autocorrelated candidate sensors
sensors
sensor data accuracy trustworthiness
pubcrawl
Portfolios
online data cleaning
online context-aware data cleaning method
MWSN
Mobile wireless sensor networks
mobile radio
Control Theory
DTP
diversified trust portfolio
Decision Making
data imprecision
data handling
Correlation
context-aware
Conferences
Computing Theory and Trust
Compositionality
composability
cleaning
beta-trust
security
biblio
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
resilience
mobile computing
mobile positioning devices
points-of-interest recommendation
privacy
privacy-preserving trajectory mining
pubcrawl
recommendation
recommender systems
Mobile communication
Resiliency
road networks
Scalability
sensitive location information exposure
traffic engineering computing
Trajectory
trajectory data mining
trajectory dataset
Electronic mail
association matrix extraction
Bipartite graph
Computing Theory
Data mining
data privacy
differential privacy
differential privacy guarantees
differentially private trajectory analysis
Algorithm design and analysis
graph theory
high-speed wireless networks
HITS
Human behavior
human factor
hyperlink-induced topic search
large-scale trajectory data
location privacy
biblio
Visible Nearest Neighbor Search for Objects Moving on Consecutive Trajectories
Submitted by grigby1 on Mon, 06/11/2018 - 2:42pm
Heuristic algorithms
Indexes
Measurement
Metrics
Monitoring
Moving objects
Multi-layer neural network
nearest neighbor search
Nickel
pubcrawl
Trajectory
visibility
biblio
Improvements to Evolutionary Model Consistency Checking for a Flapping-Wing Micro Air Vehicle
Submitted by el_wehby on Thu, 05/17/2018 - 5:52pm
flapping-wing micro air vehicle
verification and validation
vehicles
Vectors
Trajectory
single wing damage fault
simulated flapping wing micro air vehicle
robot fault diagnosis
microrobots
Mathematical model
Force
Flapping-Wing Micro Air Vehicles
Adaptation models
fault diagnosis
failure diagnosis
failure analysis
evolvable and adaptive hardware
evolutionary model consistency checking
evolutionary computation
dual wing fault
candidate robot controller evaluation
autonomous aerial vehicles
Atmospheric modeling
aerospace components
1239196
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »