Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy preserving
biblio
Blockchain Based Privacy Aware Distributed Access Management Framework for Industry 4.0
Submitted by grigby1 on Thu, 02/24/2022 - 11:20am
Scalability
ring signature
Reliability
pubcrawl
privacy preserving
Privacy Policies
privacy
performance evaluation
Industry 4.0
Industries
Human behavior
fourth industrial revolution
blockchains
blockchain
Access Control
biblio
An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart Grid
Submitted by grigby1 on Thu, 12/02/2021 - 2:19pm
pubcrawl
Task Analysis
supply and demand
smart meters
Smart Grid Sensors
Smart Grids
Smart Grid
Resiliency
resilience
Compositionality
privacy preserving
Power supplies
local differential privacy
Human Factors
Human behavior
differential privacy
data aggregation
biblio
Privacy Preserving Localization Algorithm for Underwater Sensor Networks
Submitted by grigby1 on Tue, 08/17/2021 - 3:33pm
privacy
wireless sensor networks
wireless networks
Underwater sensor networks (USNs)
Resiliency
resilience
pubcrawl
Protocols
propagation delay
privacy preserving
acoustic ray compensations
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
Global Positioning System
Compositionality
Clocks
asynchronous clock
Acoustics
biblio
A Survey on Privacy Issues of Augmented Reality Applications
Submitted by grigby1 on Thu, 06/24/2021 - 12:06pm
augmented reality
Companies
Consumer Data
data privacy
Frameworks
Human behavior
Industries
Law
Legal factors
privacy
privacy preserving
pubcrawl
resilience
Resiliency
Scalability
biblio
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
surveillance videos
Proxy Reencryption
pubcrawl
public safety applications
public safety scenarios
realistic simulation environment
Resiliency
road safety
storage management
streaming
Proxy re-encryption
trusted control center
Unmanned Aerial Vehicles
Video communication
video recording
video streaming
video surveillance
video transmission
Videos
encryption
Cloud Computing
cloud storage
composability
Cryptography
cyber physical systems
data privacy
drones
efficient drone video sharing
efficient encryption
autonomous aerial vehicles
Intelligent Transportation Systems
law enforcement
Long Term Evolution
original encryption key
privacy
privacy concerns
privacy preserving
privacy-preserving Sharing
biblio
Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
Submitted by aekwall on Mon, 02/01/2021 - 10:36am
cloud computation server
arithmetic operations
multi-threading
privacy preserving
storage costs
FHE
bit-wise encoding
bit-wise implementation
bit-wise operation
Homomorphic encryption
function evaluation
lookup table
privacy preserving calculation
single-input function
single-integer input function
time 13.0 min
time 60.0 min
two-input function
Protocols
Scalability
Servers
cloud servers
Cryptography
encrypted data
encryption
data privacy
Table lookup
Cloud Computing
Resiliency
pubcrawl
Metrics
Databases
information retrieval
fully homomorphic encryption
Human Factors
encoding
biblio
Investigation on Privacy Preserving using K-Anonymity Techniques
Submitted by grigby1 on Thu, 01/28/2021 - 1:00pm
medical conditions
UML
Resiliency
resilience
Repository
pubcrawl
Privacy-preserving
privacy preserving
Portals
personal information
person-identifiable information
online portals
Metrics
anonymity
k-anonymity techniques
k-anonymity
Human behavior
data repository
data privacy
Data mining
data encryption
Cryptography
credit card information
computing device pervasiveness
composability
component
biblio
A Study of Big Data Security on a Partitional Clustering Algorithm with Perturbation Technique
Submitted by grigby1 on Mon, 12/28/2020 - 11:40am
parallel processing
security of data
security
Scalability
Resiliency
resilience
pubcrawl
privacy preserving
principal component analysis
Precision
perturbation technique
Perturbation methods
PCA
pattern clustering
Partitioning algorithms
partitional clustering algorithm
Accuracy
Metrics
Human behavior
HDFS
Hadoop distributed file system
F-Socre Measure
execution time
Distributed databases
data privacy
Conferences
Clustering Tme
Clustering algorithms
big data security
big data privacy
Big Data
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
pubcrawl
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
indoor localization
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
differential privacy guarantee
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
Computing Theory
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 2:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
« first
‹ previous
1
2
3
4
5
next ›
last »