Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy preservation
biblio
Artificial Intelligence Based Security Orchestration, Automation and Response System
Submitted by grigby1 on Mon, 01/10/2022 - 3:55pm
Planning
threat intelligence
Security Orchestration Automation and Response
security information and event management
security
Resiliency
resilience
pubcrawl
privacy preservation
Artificial Intelligence
Metrics
Human behavior
Home appliances
Focusing
Firewalls (computing)
composability
automation
artificial intelligence security
biblio
Feature Inference Attack on Model Predictions in Vertical Federated Learning
Submitted by aekwall on Mon, 12/20/2021 - 11:30am
Human behavior
Adversary Models
vertical federated learning
privacy preservation
model prediction
feature inference attack
Collaborative Work
Radio frequency
Prediction algorithms
Organizations
Resiliency
Metrics
Scalability
pubcrawl
data privacy
Predictive models
Data models
biblio
A Synchronous Iterative Method of Power Flow in Inter-Connected Power Grids Considering Privacy Preservation: A CPS Perspective
Submitted by aekwall on Tue, 05/25/2021 - 2:32pm
pubcrawl
privacy
internet
Mathematical model
Smart Grids
Human Factors
system integration
CPS Privacy
privacy preservation
Information Masking
Iterative methods
Load flow
power flow
Synchronous Iteration
biblio
Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization
Submitted by aekwall on Mon, 03/29/2021 - 10:51am
Games
optimized k selection
optimal anonymization level
k-anonymization technique
different Nash equilibria solutions
data record
game-theoretic framework
information loss
game-theoretic approach
game theoretic security
Predictive Metrics
Human Factors
Scalability
Mathematical model
simulation
privacy
privacy preservation
pubcrawl
Resiliency
game theory
security
Organizations
data privacy
biblio
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
Submitted by aekwall on Mon, 02/22/2021 - 12:39pm
natural language processing
unsupervised machine learning
unlabeled domain-specific documents corpora
text analysis
Task Analysis
specific-domain knowledge data sets
sensitive information
Sensitive Data Extraction
Scalability
Resiliency
pubcrawl
privacy preservation
physical documents
expert systems
Medical services
machine learning
knowledge transfer
Human behavior
digital documents
Data protection
data privacy
data obfuscation procedures
artificial intelligence training
artificial intelligence systems
Artificial Intelligence
privacy
biblio
A GA-based Data Sanitization for Hiding Sensitive Information with Multi-Thresholds Constraint
Submitted by grigby1 on Tue, 02/16/2021 - 12:24pm
privacy preservation
multi-threshold
Itemsets
Data Sanitization
Statistics
Sociology
genetic algorithm
genetic algorithms
optimization
Compositionality
privacy
Data mining
Databases
Data models
security
Resiliency
resilience
Human behavior
pubcrawl
biblio
A service-oriented adaptive anonymity algorithm
Submitted by grigby1 on Thu, 01/28/2021 - 12:59pm
quasiidentifier attributes
Metrics
Partitioning algorithms
privacy
privacy preservation
privacy-preserving data publishing
pubcrawl
Publishing
Quasi-identifier Attributes
K-anonymity algorithms
released data
resilience
Resiliency
sensitive attributes
service-oriented adaptive anonymity algorithm
service-oriented architecture
splitting value
Adaptation models
k-anonymity
Internet of Things
Human behavior
distribution characteristics
dispersion
data privacy
data handling
contribution value differences
composability
attribute values distribution
attribute value distribution
anonymous results
anonymized data
anonymity group partition process
anonymity
biblio
A Hybrid Secure Keyword Search Scheme in Encrypted Graph for Social Media Database
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
query processing
graph
graph encryption
graph generation
graph theory
hybrid secure keyword search scheme
kNK keyword search algorithm
nearest neighbour methods
privacy preservation
encryption
Resiliency
search operation
search process
shortest path algorithm
social media database
social networking (online)
top k nearest keyword search algorithm
nearest neighbor search
encrypted graph
distributed environment
data privacy
Cryptography
confidentiality
computer network security
composability
cloud environment
Cloud Computing
attack graphs
advanced encryption standard algorithm
active attacks
Predictive Metrics
Measurement
pubcrawl
biblio
Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles, Practice, and Experiences
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
smart cities
privacy-preserving OLAP-based big data analytics
OLAP-based Big Data Analytics
OLAP data cubes
OLAP analysis
OLAP aggregate privacy
Experiments and Analysis over Big Datasets
Emerging Big Data Applications
distributed privacy-preserving OLAP framework
Distributed Privacy-Preserving OLAP
big data framework
authoritative analytical tool
bioinformatics
big data privacy
social networks
Distributed databases
tools
Social network services
privacy preservation
Measurement
Big Data
privacy
Scalability
data privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Data mining
data analysis
security of data
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
IP networks
trustworthiness
Trusted Computing
third-party DNS service
Third-Party DNS
T2DNS
service proxy
Servers
server attackers
pubcrawl
Protocols
privacy preservation
privacy
obfuscation protocol
attestation
Internet infrastructure
internet
Intel SGX
initialization process
hybrid protocol
encryption protocol
encryption
data privacy
Cryptographic Protocols
computer network security
composability
client DNS queries
channel attackers
« first
‹ previous
1
2
3
4
5
6
next ›
last »