Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Probabilistic logic
biblio
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption
Submitted by aekwall on Mon, 11/16/2020 - 12:10pm
high communication
database service providers
Outsourced Database
Outsourced Database Integrity
business owners
data completeness protecting scheme
data confidentiality protection aspect
data correctness
data integrity protection aspect
database outsourcing
OPE encrypted
ORDER BY
order-preserving encryption
outsourced data secure
query completeness
range queries
widely used encryption scheme
composability
Servers
Cryptography
data owners
encryption
data privacy
data integrity
Resiliency
pubcrawl
Cloud Computing
Metrics
query processing
Databases
Probabilistic logic
database management systems
security protection
outsourcing
biblio
Applying Probabilistic Programming to Affective Computing
Submitted by grigby1 on Mon, 10/05/2020 - 12:50pm
Compositionality
Human behavior
Human Factors
Computing Theory and Compositionality
affective computing
Artificial Intelligence
cognition
Computational modeling
Emotion Theory
Modeling Human Emotion
Object oriented modeling
Probabilistic logic
programming
psychology
pubcrawl
biblio
Formalizing Constructive Cryptography using CryptHOL
Submitted by aekwall on Mon, 09/14/2020 - 11:27am
Theorem Proving
composability
random systems
proof rules
information-theoretically secure channel
game-based proofs
CryptHOL
constructive cryptography
computer-aided cryptography
composable cryptographic security statements
computer aided cryptography
universal composability
complex system
Cryptography
cryptographic proofs
formal methods
verification
formal verification
computer science
Complexity theory
Probabilistic logic
tools
pubcrawl
game theory
encryption
biblio
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach
Submitted by grigby1 on Fri, 09/11/2020 - 11:08am
social networking (online)
social media botnets
social botnet effectiveness
social botnet
deterministic propagation actions
Physics
social media platforms
botnet
game theory
Statistics
Sociology
social media
social media networks
pubcrawl
Social network services
probability
probabilistic model
Probabilistic logic
Compositionality
Metrics
botnets
invasive software
computer science
security
Resiliency
biblio
A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms
Submitted by aekwall on Mon, 08/17/2020 - 10:35am
execution-profiling CFG
operating systems (computers)
coarse-grained check
coarse-grained control-flow attestation schemes
Control Flow Attestation
control-flow security
costly fine-grained level
Embedded Platform Security
embedded software
Predictive models
execution-profiling control-flow graph
fine-grained remote control-flow attestation
MGC-FA
mutable control-flow attestation scheme
mutable granularity control-flow attestation
Mutable Granularity Scheme
remote control-flow attestation scheme
Resiliency
attestation
Remote Attestation
Runtime
security
software integrity
control-flow attacks
embedded systems
Raspberry Pi
security of data
Human behavior
pubcrawl
composability
machine learning
Probabilistic logic
probability
ARM TrustZone
biblio
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
key policy attribute based encryption
Vectors
searchable encryption
Scalability
pubcrawl
Probabilistic logic
policy-based governance
optimization
optimisation
KP-ABE-AE scheme
KP-ABE
key-policy attribute-based encryption with attribute extension
key-policy attribute-based encryption
Access Control
Iron
IPE schemes
Identity-based encryption
functional encryption scheme integration
functional encryption
fine-grained access control
encryption
Cryptography
collaboration
authorisation
access policy
access policies
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 10:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold
Submitted by grigby1 on Fri, 07/10/2020 - 10:40am
private data exposure
learning (artificial intelligence)
manifold
Manifolds
medical information systems
medical research
multigrid
multigrid solver method
privacy
privacy exposure risk
privacy legislation
information loss
Probabilistic logic
probability
pubcrawl
quasiidentifiers
Scalability
security of data
strong guarantees
thwarts de-anonymisation
treatment data
data anonymity
attribute combination
attribute pairs
attribute separation
Bayes methods
Bayesian networks
Bayesian networks optimised
belief networks
case agnostic method
Data Anonymisation
anonymisation algorithms
data deletion
Data models
data privacy
data transformation
Distributed databases
distributed high-dimensional data repositories
distributed high-dimensional health data silos
high conditional probability
identifying data exposure
biblio
Uncertainty-Aware Opinion Inference Under Adversarial Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
Robustness
Probabilistic logic
probabilistic model
probabilistic soft logic
probability
Probability density function
PSL
pubcrawl
resilience
Resiliency
possible adversarial attacks
security of data
Silicon
Training
uncertain evidence
uncertainty
uncertainty-aware opinion inference
unknown opinions
white box adversarial attacks
White Box Security
data mining tasks
adversarial collective opinion inference
adversarial evidence
black box adversarial attacks
collective subjective logic
composability
Compositionality
computational complexity
CSL
Data mining
Adv-COI
Data models
Decision Making
highly scalable opinion inference
inference mechanisms
learning (artificial intelligence)
logic-rule based structured data
Metrics
minimax techniques
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »