Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transparency
biblio
Label-Only Model Inversion Attacks via Boundary Repulsion
Submitted by aekwall on Fri, 03/31/2023 - 9:35am
Semantics
privacy and ethics in vision
fairness
ethics
Adversarial attack and defense
accountability
transparency
Training data
Black Box Attacks
Neural networks
composability
Resiliency
Metrics
pubcrawl
face recognition
Predictive models
computer architecture
biblio
Mixed Differential Privacy in Computer Vision
Submitted by grigby1 on Fri, 01/06/2023 - 4:10pm
transparency
retrieval
Recognition: Detection
Privacy and federated learning
privacy and ethics in vision
fairness
categorization
Human Factors
computer vision
AI
differential privacy
Training
Upper bound
visualization
accountability
Computational modeling
privacy
Scalability
Resiliency
resilience
pubcrawl
biblio
Towards A Transparent and Privacy-Preserving Healthcare Platform with Blockchain for Smart Cities
Submitted by grigby1 on Tue, 10/12/2021 - 2:54pm
blockchain
Companies
data privacy
healthcare data
Human behavior
Insurance
Insurance policy
Medical services
privacy
Privacy Policies
pubcrawl
Scalability
smart cities
Smart City
transparency
biblio
Secure and Transparent Public-key Management System for Vehicular Social Networks
Submitted by aekwall on Tue, 08/17/2021 - 4:15pm
security
blockchain
privacy
authentication
Scalability
social networking (online)
Public key
pubcrawl
Metrics
Resiliency
Human behavior
Proposals
key management
transparency
Vehicular Public-key Infrastructure (V-PKI)
Vehicular Social Networks (VSNs)
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
Trustworthy AI Development Guidelines for Human System Interaction
Submitted by aekwall on Mon, 02/01/2021 - 11:38am
human trust
user trust
trustworthy AI research area
trustworthy AI development guidelines
Trustworthy AI
marine safety
Human System Interactions
human system interaction
Human Machine Interactions
explainable AI
AI-based systems
AI system life cycle
AI Life Cycle
Organizations
transparency
user interfaces
Guidelines
Artificial Intelligence
testing
optimization
Robustness
pubcrawl
Human behavior
Data models
Trusted Computing
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
“Silent Battle” Goes Loud: Entering a New Era of State-Avowed Cyber Conflict
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
pubcrawl
transparency
state-sponsored cyber attacks
state-avowed cyber conflict
security of data
Scalability
Salisbury poison attack
Russian GRU officers
Resiliency
resilience
public preparedness
attribution
politics
Netherlands intelligence services
NATO
Human behavior
EU nations
Deterrence
cyber policy
cyber conflict
cyber aggressor
biblio
Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation
Submitted by grigby1 on Fri, 05/22/2020 - 2:08pm
Internet of Things
transparency
tracking
security
Resiliency
resilience
pubcrawl
network accountability
Network
Metrics
IoT device mesh network
IoT
accountability
Immutable
heterogenous IoT networks
Heterogenous
enterprise business use
Distributed databases
Digital Forensics
Cryptography
composability
blockchain technology
blockchain
biblio
Framework for Trustworthy Software Development
Submitted by aekwall on Mon, 04/13/2020 - 10:20am
auditability
Trustworthy Systems
trustworthy software development
trustworthy software
transparency
total product life cycle
smart advisors
process level
intelligent software applications
governance framework
Governance
bias-free
security of data
application development life cycle
algorithmic level
cyber physical systems
ubiquitous computing
trustworthiness
software engineering
Provenance
Compliance
composability
pubcrawl
Resiliency
1
2
next ›
last »