Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy protection
biblio
DP-BEGAN: A Generative Model of Differential Privacy Algorithm
Submitted by grigby1 on Fri, 06/30/2023 - 3:45pm
Computational modeling
privacy data publishing
BEGAN
Publishing
GANs
data analysis
differential privacy
privacy protection
composability
Training
privacy
Data models
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Research on Location Information and Privacy Protection Based on Big Data
Submitted by grigby1 on Fri, 05/12/2023 - 10:20am
location information
The fuzzy theory
supply chains
Scalability
Resiliency
resilience
pubcrawl
privacy protection
privacy
network security
Forward Error Encryption
Information services
information networks
Human Factors
Human behavior
Heuristic algorithms
data privacy
Control Theory
Big Data
biblio
Blockchain-Oriented Privacy Protection with Online and Offline Verification in Cross-Chain System
Submitted by grigby1 on Fri, 04/14/2023 - 4:13pm
Access Control
blockchain
blockchain security
blockchains
data privacy
information security
privacy
privacy protection
pubcrawl
Resiliency
Scalability
smart contracts
biblio
Research on Enterprise Information Security and Privacy Protection in Big Data Environment
Submitted by grigby1 on Fri, 03/31/2023 - 11:13am
Big Data
big data platform
Resiliency
Human Factors
big data privacy
privacy protection
Data Security
Decision Making
Production
information security
data privacy
privacy
Scalability
Metrics
Human behavior
pubcrawl
machine learning
biblio
Secret Numerical Interval Decision Protocol for Protecting Private Information and Its Application
Submitted by grigby1 on Fri, 02/17/2023 - 5:20pm
privacy protection
Scientific Computing Security
secret comparison
numerical range
Morton code
Asia
Homomorphic encryption
scientific computing
Compositionality
information security
Decision Making
Protocols
privacy
Resiliency
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
Efficient 5G Network Slicing Selection with Privacy in Smart Grid
Submitted by grigby1 on Fri, 01/20/2023 - 5:03pm
feature extraction
pubcrawl
Metrics
Resiliency
Safety
privacy
5G mobile communication
Smart Grid
estimation
Smart Grids
privacy protection
network slicing
5G network slicing selection
match estimation
Smart Grid Privacy
biblio
Big Data Analysis and Mining Technology of Smart Grid Based on Privacy Protection
Submitted by grigby1 on Fri, 01/20/2023 - 4:59pm
information security
pubcrawl
Metrics
Resiliency
privacy
data privacy
Protocols
Smart Grid
Big Data
Companies
privacy protection
Meters
Data mining
Smart Grid Privacy
biblio
FedMix: A Sybil Attack Detection System Considering Cross-layer Information Fusion and Privacy Protection
Submitted by aekwall on Thu, 01/05/2023 - 5:10pm
vehicular ad hoc networks
Sybil attack detection
privacy protection
sybil attacks
information fusion
Cross layer design
ANN
federated learning
data integrity
privacy
composability
Resiliency
Metrics
pubcrawl
Analytical models
data privacy
Training
biblio
Location Based Privacy Protection Data Interference Method
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
Compositionality
Data interference
Soft sensors
Location Privacy in Wireless Networks
location privacy
Phantoms
privacy protection
Publishing
wireless networks
energy consumption
pubcrawl
composability
wireless sensor networks
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
TSITE IP: A Case Study of Intellectual Property Distributed Platform based on Cloud Services
Submitted by grigby1 on Mon, 10/03/2022 - 12:19pm
Market research
TSITE
Operation Service
distributed computing
Resiliency
Information age
ip protection
Government
Distributed databases
Cloud Computing
intellectual property
privacy protection
composability
Computers
resilience
policy-based governance
pubcrawl
1
2
3
4
5
6
7
8
9
…
next ›
last »