Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy protection
biblio
Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
multibranch source location privacy protection method
radiofrequency interference
WSN
source node
location privacy preservation
communication overhead
Position measurement
location security
branch interference area
location-related data
Base stations
multibranch source location privacy protection scheme
multiple branch
multiple proxy sources
proxy source
random walk
sensing information
sink location privacy
Location Privacy in Wireless Networks
privacy
data privacy
telecommunication security
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
location privacy
Monitoring
Routing
sensor nodes
Metrics
random processes
network lifetime
base station
Compositionality
privacy protection
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:56am
ring signature
Computing Theory and Privacy
wearable smart sensing devices
user identifier
stealth address
smart sensing area
smart sensing
privacy-user-friendly scheme
personal data privacy
Intelligent sensors
blockchain based scheme
wearable computers
user experience
Scalability
privacy protection
sensors
human computer interaction
Public key
service providers
blockchain
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
biblio
Modeling and analyzing privacy-awareness social behavior network
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
privacy protection
Computing Theory and Privacy
social behavior network
privacy driven model
privacy disclosure behavior
networked human society
network evolutions
highly dynamical network behaviors
Habitual privacy
driving force
decision process
privacy awareness
behavioural sciences computing
Social Behavior
Sensitivity
Scalability
information theory
complex networks
social network
social networking (online)
Computational modeling
Social network services
privacy
pubcrawl
Human behavior
Resiliency
security
Conferences
data privacy
biblio
IoT Trajectory Data Privacy Protection Based on Enhanced Mix-zone
Submitted by aekwall on Mon, 09/21/2020 - 3:50pm
privacy protection
Control Theory and Privacy
weighted undirected graph
user flow-based algorithm
traditional Mix-zone
Mix-zone
migration probability
IoT trajectory data privacy protection
enhanced Mix-zone
attack method
data sets
cyber physical systems
computer network security
cyber-physical systems
probability
privacy
graph theory
pubcrawl
Human behavior
Resiliency
information security
Internet of Things
data privacy
Scalability
biblio
Symmetries and privacy in control over the cloud: uncertainty sets and side knowledge*
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
cloud
Control Theory and Privacy
uncertainty sets
transformation-based method
side knowledge
control algorithms
Cost function
Transforms
cyber physical systems
set theory
Trajectory
Cloud Computing
privacy protection
control engineering computing
cyber-physical systems
privacy
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Scalability
biblio
Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
privacy protection
big data privacy
technology protection
stand-alone simulation experiment
query protocol design
query privacy protection model
query mode design
potential value
Massive Data
experimental data
data privacy protection model
complexity analysis
big data platform
big data environment
Data Security
Access Control
Scalability
Human Factors
Security analysis
query processing
Metrics
privacy
pubcrawl
Resiliency
Data models
Protocols
security
data privacy
Big Data
data owners
Servers
biblio
A Semantic k-Anonymity Privacy Protection Method for Publishing Sparse Location Data
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
semantic k-anonymity privacy protection method
privacy disclosure
privacy leaks
privacy protection
pubcrawl
Publishing
resilience
Resiliency
semantic attacks
nonsensitive data
semantic privacy protection
semantic translation
Semantics
sensors
sparse location data
Trajectory
user sensitive information
k-anonymity
anonymous set
attacker
composability
compressed sensing
data privacy
diversity reception
Human behavior
information science
anonymity
location based services
location information
location technology
location-based services
Metrics
missing location data
multiuser compressing sensing method
biblio
Protecting Multimedia Privacy from Both Humans and AI
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
image
AI
protecting multimedia privacy
private information
multimedia privacy issues
multimedia data
multimedia
image privacy
human adversaries
AI-assisted malicious entities
AI-assisted attackers
adversarial image perturbation
Image coding
privacy
Scalability
face recognition
privacy protection
deep learning
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Artificial Intelligence
security of data
biblio
A Vehicle Trajectory Adversary Model Based on VLPR Data
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
traffic engineering computing
qualified identifier attributes
Resiliency
road average speed
road traffic
road vehicles
Roads
Scalability
target trajectory
pubcrawl
Trajectory
trajectory linking
vehicle information
vehicle license plate recognition data
vehicle suspicion list
vehicle trajectory adversary model
VLPR system
image recognition
Adversary Modeling
Adversary Models
closest time method
Data models
data privacy
desensitized VLPR data
Foshan City VLPR data
Human behavior
adversary model
ITS
Licenses
Metrics
privacy
privacy attacking method
privacy disclosure
privacy protection
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »