Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
deep learning
networked system
network security practices
network attack detection technology
network attack detection tasks
network attack detection
Graph Kernel
flow-based network attack detection
deep learning architecture
anomaly-based approaches
Network Security Architecture
deep neural networks
Computer crime
network traffic
convolutional neural nets
Neural networks
graph theory
pubcrawl
Resiliency
learning (artificial intelligence)
computer architecture
Kernel
IP networks
computer network security
biblio
Improving Privacy in Graphs Through Node Addition
Submitted by aekwall on Mon, 04/20/2020 - 10:32am
Privacy-Preserving Mechanism (PPM)
k- automorohism
k- isomorphism
Measurement
Metrics
naïve ID removal
node addition
Peer-to-peer computing
Predictive Metrics
privacy
privacy models and measurement
k- anonymity
privacy-preserving mechanisms
pubcrawl
Resiliency
Routing
Scalability
seed-based attack
strongest attacks
structural attack
structure-based attack
structure-based de-anonymization attacks
edge addition
anonymity privacy
anonymization and de-anonymization
attack graphs
Autonomous System (AS)level graph
composability
computer security
Control Theory and Privacy
cyber-physical systems
data privacy
degree attacks
Computing Theory and Privacy
fake edges
fake nodes
graph data
graph data necessitates
graph privacy
graph theory
Human behavior
Inter-domain routing
internet
biblio
Social Privacy Score Through Vulnerability Contagion Process
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Diffusion processes
privacy models and measurement
vulnerable social interactions
vulnerable interactions
vulnerable friends
vulnerability measurement
vulnerability diffusion process
vulnerability contagion process
social privacy score
privacy fields
privacy awareness framework
over-trusting vulnerable users
Messaging services
graph-theoretical properties
security of data
sensitive information
Message service
privacy issues
social networking (online)
Metrics
privacy
graph theory
pubcrawl
Electronic mail
Current measurement
security
data privacy
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
biblio
Enabling Adaptive Deep Neural Networks for Video Surveillance in Distributed Edge Clouds
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
video surveillance
two-stage delay-aware graph searching approach
task scheduling
remote clouds
network delay
network cameras
intelligent video surveillance task scheduling problem
input video segment
feature similarity
distributed edge clouds
computing delay
adaptive DNN model selection method
adaptive deep neural networks
NP-hard
Computation offloading
deep neural networks
Cloud Computing
scheduling
edge computing
video signal processing
image segmentation
computational complexity
resource allocation
neural nets
Metrics
graph theory
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Beyond Pixels: Image Provenance Analysis Leveraging Metadata
Submitted by aekwall on Mon, 03/30/2020 - 11:34am
meta data
provenance graph construction
Phylogeny
Painting
online multimedia
noncontent-based information
metadata-based inferences
image provenance analysis
cultural analytics
automated provenance analysis
Provenance
inference mechanisms
Semantics
visualization
Task Analysis
digital image forensics
Image forensics
multimedia computing
video signal processing
metadata
internet
Metrics
Image edge detection
graph theory
composability
pubcrawl
Human behavior
Resiliency
biblio
Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
graph segmentation operator
Approximation algorithms
boundary criteria
context free language
context-free grammar
data science lifecycle provenance
data science platforms
destination vertices
graph data models
graph query
graph query model
approximation theory
graph summarization operator
high-level graph query operators
model management
provenance ingestion mechanisms
provenance management
PSPACE-complete
query techniques
Skeleton
source vertices
optimisation
Resiliency
Human behavior
pubcrawl
composability
graph theory
Metrics
query processing
Databases
context-free grammars
Data models
computational complexity
meta data
metadata
Writing
Pipelines
Semantics
Provenance
data science
data handling
biblio
A Graph-Based Modular Coding Scheme Which Achieves Semantic Security
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
error-correcting code
universal hash functions
theoretical cryptography
telecommunication security
Semantics
semantic security
Receivers
Random variables
pubcrawl
modular wiretap codes
graph-based modular coding scheme
graph theory
Gaussian channels
coding theory
error correction codes
encoding
Eigenvalues and eigenfunctions
edge-disjoint biregular graphs
discrete Gaussian wiretap channel
Cryptography
Compositionality
composability
channel coding
BRI function
biregular irreducible functions
security
biblio
A Theoretical Model for Fork Analysis in the Bitcoin Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
fork branches
Theoretical modeling
theoretical cryptography
random processes
pubcrawl
Protocols
probability
peer-to-peer network
Peer-to-peer computing
network simulator OMNET
network protocols
network bandwidth
Nakamoto consensus
historical Bitcoin data
graph theory
fork occurrence probability
bitcoin
fork analysis
Erdös-Rényi random graph construction
Cryptography
cryptocurrency
cryptocurrencies
computational complexity
Compositionality
composability
blockchain networks
Blockchain fork
block selection rules
block propagation delay
Bitcoin network
Bitcoin consensus
biblio
Switching Topology for Resilient Consensus Using Wi-Fi Signals
Submitted by grigby1 on Mon, 03/02/2020 - 1:38pm
Topology
societal integration
Switches
switching signal
switching topology
Sybil attack
sybil attacks
telecommunication network topology
telecommunication security
telecommunication switching
security
true graph
untrustworthy agents
untrustworthy transmissions
Wi-Fi signals
wireless channels
Wireless communication
wireless LAN
wireless sensor networks
wireless transmissions
multirobot team security
Communication system security
composability
connected topology
graph theory
initial topology
legitimate agents
Metrics
multi-robot systems
multiagent consensus
arbitrary malicious node values
network topology
physical networks
physical properties
probability
pubcrawl
resilience
Resiliency
resilient consensus
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »