Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy preservation
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 1:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
biblio
Secure Data Packet in MANET Based Chaos-Modified AES Algorithm
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
chaotic communication
manet privacy
Wireless Ad-Hoc Networks
secure data packet
safety-sensitive applications
privacy conference meetings
passive attack
open architecture
MANET based chaos-modified AES algorithm
data packets payload
data packet
chaotic
dynamic topology
key generation
AES
Three-dimensional displays
Cryptography
Compositionality
chaos
military applications
telecommunication network topology
mobile ad hoc networks
MANET
Logistics
Metrics
privacy preservation
pubcrawl
Resiliency
telecommunication security
data privacy
encryption
biblio
A radio-fingerprinting-based vehicle classification system for intelligent traffic control in smart cities
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
precise vehicle classification
comprehensive measurements
cost-efficiency
dynamic control methods
dynamic type-specific lane assignments
global system parameters
highly sophisticated traffic control methods
highly-dynamic Cyber Physical System
individual vehicles
intelligent traffic control systems
key element
machine learning based approach
key performance indicators
radio-fingerprint
radio-fingerprinting
real-time
road traffic control
specific data
street network
Traffic flow
up-to-date traffic
vehicle classification system
vehicle type information
CPS Privacy
vehicular ad hoc networks
traffic engineering computing
data privacy
Receivers
Measurement
Support vector machines
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
privacy preservation
Roads
road vehicles
pattern classification
machine learning
privacy
cyber physical systems
Human Factors
smart cities
system state
CPS
System performance
radio transmitters
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 10:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
biblio
Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
confidential label
privacy models and measurement
Sibson mutual information
privacy-utility trade-off
privacy preserving data disclosure mechanisms
privacy metric
output data vector
MNIST dataset
maximal information leakage
Information Theoretic Privacy
information theoretic measures
FERG dataset
data vectors
data driven setting
data privacy
Bernoulli-Gaussian model
auto-encoders
privacy preservation
distortion
generative adversarial networks
gaussian distribution
Measurement
Mutual information
optimization
Metrics
privacy
pubcrawl
Data models
biblio
Comparative Evaluations of Privacy on Digital Images
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
differential privacy
privacy models and measurement
societal issue
personal privacy analysis
digital images
comparative evaluations
privacy measurement
Face
Sensitivity
data privacy
social networks
Metrics
social networking (online)
Licenses
privacy
privacy preservation
pubcrawl
feature extraction
biblio
Comparative Evaluations of Privacy on Digital Images
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
differential privacy
privacy models and measurement
societal issue
personal privacy analysis
digital images
comparative evaluations
privacy measurement
Face
Sensitivity
data privacy
social networks
Metrics
social networking (online)
Licenses
privacy
privacy preservation
pubcrawl
feature extraction
biblio
A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P)
Submitted by grigby1 on Fri, 04/03/2020 - 11:33am
cybersecurity information exchange
versatile information exchange platform
STIX
shared threat data
shared data
privacy-preserving mechanisms
privacy preservation
information sharing
information management
information exchange platform
information exchange
CYBEX-P
cybersecurity techniques
cybersecurity information sharing platform
cybersecurity information exchange with privacy
privacy
Cybersecurity
cyber-information exchange
cyber threats
cyber defense
Privacy Policies
computer security
Databases
Scalability
data privacy
Human behavior
pubcrawl
Servers
Organizations
security of data
biblio
C2P2: Content-Centric Privacy Platform for Privacy-Preserving Monitoring Services
Submitted by grigby1 on Tue, 01/21/2020 - 10:28am
Monitoring service
Wth-privacy-preserving monitoring service
ubiquitous surveillance cameras
town and country planning
surveillance
Smart City
smart cities
security
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving monitoring services
privacy preservation
privacy leakage
privacy
C2P2
information-centric networking
Information Centric Networks
Information Centric Networking (ICN)
Information Centric Network
image recognition
image classification model
image classification
encryption
data privacy
data aggregation
content-centric privacy platform
cloud-based services
Cloud Computing
Cameras
« first
‹ previous
1
2
3
4
5
6
next ›
last »