Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
location privacy
biblio
Preserving Location Privacy in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
location obfuscation
vulnerabilities
user location information
trust
sensors
security
public adoption
public acceptance
pubcrawl
Proposals
privacy-preserving location service
privacy
mobile computing
Mix-zone
location-obfuscation
location privacy
CPS Privacy
location based services
IoT devices
IoT
Internet of Things
Human Factors
Human behavior
data privacy
cyber-physical systems
cyber physical systems
CPSS
CPS
context-awareness
Conferences
actuators
biblio
Rethinking Location Privacy for Unknown Mobility Behaviors
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
blank-slate models
Computing Theory and Privacy
Zirconium
unknown mobility
sporadic hardwired models
Quantifying privacy
profile estimation-based LPPM
privacy properties
nonsporadic location privacy scenarios
mobility patterns
Mobility Models
mechanism design
LPPM design
location privacy-preserving mechanisms
location privacy service
location privacy protections
Scalability
blank-slate approach
design phase
location privacy
Training data
data privacy
testing
Training
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data models
mobile computing
biblio
Collaboration-Based Location Privacy Protection Method
Submitted by grigby1 on Thu, 08/13/2020 - 4:34pm
privacy protection algorithm
collaborative users
information entropy
location anonymity
location privacy
location-based
maximum anonymity value set
multihop communication
personalized anonymity
collaboration-based location privacy protection method
query block exchange
query diversity
query information
random-QBE
Services
spread spectrum communication
user collaboration
user cooperative privacy protection
Switches
Servers
pubcrawl
Human behavior
resilience
Resiliency
data privacy
privacy
composability
collaboration
quality of service
Metrics
query processing
anonymity
groupware
anonymity requirement
anonymous group
anonymous location
biblio
Privacy-Preserving Online Task Assignment in Spatial Crowdsourcing with Untrusted Server
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
location based services
privacy models and measurement
worker-task pair reachability
worker travel distance
worker locations
task locations
system overhead
spatiotemporal tasks
spatial crowdsourcing
privacy-preserving online task assignment
perturbed locations
geo indistinguishability
Servers
Personnel
probability
Measurement
Analytical models
Metrics
privacy
location privacy
crowdsourcing
pubcrawl
Task Analysis
data privacy
biblio
Privacy-Preserving Online Task Assignment in Spatial Crowdsourcing with Untrusted Server
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
location based services
privacy models and measurement
worker-task pair reachability
worker travel distance
worker locations
task locations
system overhead
spatiotemporal tasks
spatial crowdsourcing
privacy-preserving online task assignment
perturbed locations
geo indistinguishability
Servers
Personnel
probability
Measurement
Analytical models
Metrics
privacy
location privacy
crowdsourcing
pubcrawl
Task Analysis
data privacy
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
efficiency
privacy models and measurement
server security
Location-based social applications
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
query processing
security of data
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
query processing
privacy models and measurement
server security
Location-based social applications
location transformation
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
security of data
efficiency
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks
Submitted by aekwall on Mon, 03/02/2020 - 11:36am
MDP
adaptive neuro fuzzy inference system
ANFIS
complex security
FIS learning rules
forwarding node
malicious node
marine communication
MATLAB
UWSN
resource constraint behaviour
sensor node
trust behaviour
trust management model
trusted node
Underwater Wireless Sensor Networks
Underwater Networks
Routing
Scalability
data privacy
telecommunication security
Resiliency
pubcrawl
wireless sensor networks
location privacy
privacy
Intrusion Detection
Metrics
authentication
Data mining
information and communication technology
Markov Decision Process
Markov processes
Trust management
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 2:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
A Control-Theoretic Approach for Location Privacy in Mobile Applications
Submitted by grigby1 on Mon, 12/16/2019 - 2:53pm
location privacy
users mobility pattern
Scalability
Resiliency
resilience
pubcrawl
protection algorithm
privacy issues
privacy
POI-related privacy measure
PI control strategy
PI control
mobility records simulation
mobile computing
Mobile Applications
Meters
Computing Theory and Privacy
location information
literature focus
Human behavior
dynamic modeling
dispersion
data privacy
Data models
cyber physical systems
Cyber Physical System
control-theoretic approach
control-based approach
Control Theory
control signals
control formulation
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »