Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user privacy
biblio
Check-It: A plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web
Submitted by aekwall on Mon, 07/13/2020 - 10:19am
Artificial Intelligence
Web browser plugin
News Content
fake news identification
fake news detection
domain flag-lists
Check-It
web of trust
misinformation
artificial intelligence techniques
online front-ends
user privacy
feature extraction
Uniform resource locators
Browsers
Linguistics
Analytical models
internet
social networking (online)
online social networks
composability
pubcrawl
Resiliency
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Submitted by grigby1 on Thu, 07/09/2020 - 12:58pm
privacy analysis
word representations
vast data stores
utility experiments highlight
user privacy
training machine learning models
text analysis
supporting data driven decisions
semantic generalization
Scalability
Resiliency
resilience
pubcrawl
proof satisfying dx-privacy
probability
privacy experiments
arbitrary piece
privacy
nonHamming distance metrics
learning (artificial intelligence)
Human Factors
Human behavior
high dimensional hyperbolic space
hierarchical representations
expected privacy
downstream machine learning models
document redaction
differential privacy
Data Sanitization
data privacy
data deletion
Compositionality
biblio
Towards Privacy in Geographic Message Dissemination for Connected Vehicles
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
legal regulations
Security by Default
vehicle routing
traffic information systems
traffic information
space-filling curves
server infrastructure
Routing
road traffic
privacy-by-design principle
privacy-by-design
privacy-by-default principle
location updates
location based services
road safety
geographic relevance area
geographic message dissemination
consistent hashing
connected vehicles
Traffic Management
user privacy
client-server systems
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
biblio
Privacy Protection Scheme in Smart Grid Using Rechargeable Battery
Submitted by grigby1 on Mon, 03/09/2020 - 1:57pm
Scalability
Metrics
policy-based governance
privacy
privacy protection scheme
pubcrawl
rechargeable battery
resilience
Resiliency
Information Leakage
secondary cells
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
statistical methods
user privacy
electrical power
automation
batteries
battery power information
collaboration
composability
data privacy
Educational institutions
electrical load information
Abstracts
Electronic mail
energy consumption
heuristic algorithm
home energy use information
home network
Human behavior
Human Factors
biblio
Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
pervasive computing devices
user anonymity
user privacy
encoding
cloud-based servers
configurable anonymous authentication schemes
device-user authentication parameters
IoT authentication
IoT testbed
power consumption
privacy-preserving authentication schemes
smart home occupancy
VCSE-based approach
verifiable common secret encoding
zero knowledge proof
ZKP-based approach
zero trust
computer network security
Human Factors
IoT infrastructure
radiofrequency identification
anonymity
authentication
Cryptography
privacy
policy-based governance
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
Scalability
biblio
Easy Secure Login Implementation Using Pattern Locking and Environmental Context Recognition
Submitted by grigby1 on Tue, 11/26/2019 - 2:34pm
Scalability
mobile computing
mobility features
pattern locking recognition
pattern locks
privacy
pubcrawl
resilience
Resiliency
lock screen application
secure login implementation
smart phones
smartphone application
testing
user privacy
Wi-Fi Mac Address
Wireless fidelity
wireless LAN
Ease of Use
authentication
authentication mechanism
authorisation
Context
Context Data
context data analysis
data analysis
data privacy
android
environmental context recognition
Global Positioning System
GPS location
Human behavior
human factor
Human Factors
invulnerable environment
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
Securing Social Media User Data: An Adversarial Approach
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
Resiliency
Human behavior
pubcrawl
composability
Metrics
relational database security
data sharing
data utility
de-anonymization attack
heterogeneous data
social network analysis
user privacy
biblio
Minimizing Privilege Assignment Errors in Cloud Services
Submitted by grigby1 on Thu, 01/31/2019 - 11:24am
cloud
Cloud Computing
Metrics
principle of least privilege
pubcrawl
resilience
Resiliency
role based access control (rbac)
Scalability
user privacy
user privacy in the cloud
« first
‹ previous
1
2
3
4
5
6
next ›
last »