Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
k-anonymity
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
TMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
perturbation
TMk-anonymity
Resiliency
resilience
pubcrawl
privacy preservation
privacy
Pk-anonymity
Perturbation methods
anonymity
Metrics
k-anonymity
Human Factors
Human behavior
Global Positioning System
gaussian distribution
composability
anonymization
biblio
Dummy Location Selection Scheme for K-Anonymity in Location Based Services
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
mobile computing
Servers
security of data
Security analysis
security
Resiliency
resilience
query processing
query probability
pubcrawl
probability
privacy concerns
privacy
optimization
optimisation
multiobjective optimization problem
anonymity
Metrics
low complexity dummy location selection scheme
location based services
localization information
LBS
k-anonymity
K-1 dummy locations
Human behavior
Geometry
dummy location
data privacy
composability
Complexity theory
cloaking area based algorithm
Artificial Intelligence
biblio
Implementing A Framework for Big Data Anonymity and Analytics Access Control
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
Data processing
tools
Sensitivity
Resiliency
resilience
pubcrawl
privacy protection
Metrics
MapReduce
k-anonymity
Human behavior
Hadoop ecosystems
framework standardization
data suppression
Access Control
data privacy
data management
data anonymization methods
data analysis
composability
Big Data anonymity framework
Big Data
authorization
authorisation
anonymization
anonymity
analytics access control
biblio
Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
resilience
WSN communication protocols
wireless sensor networks
telecommunication security
tactical WSN
tactical wireless sensor networks
tactical sensor networks
specific routing protocol
sink-node vulnerability
sensor nodes
sensor networks
security
Routing protocols
Routing
Resiliency
6LoWPAN
remote sensing
reactive routing protocol
pubcrawl
privacy
modified LOADng protocol
military communication
Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol
k-anonymity
IEEE 802.15.4
IEEE 802.15 Standard
enhancing sink node anonymity
Cyber Physical Systems Security
composability
Ad hoc networks
biblio
Enhance Privacy in Big Data and Cloud via Diff-Anonym Algorithm
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
k-anonymity
Scalability
Resiliency
pubcrawl
private data
privacy models
privacy infringement
privacy guarantee rate
privacy enhancement
privacy assurance
privacy
Policy
Metrics
accurate data
Influenza
Human Factors
differential privacy
diff-anonym algorithm
data privacy
Data models
data anonymity
Computers
Cloud Computing
cloud
big data privacy
Big Data
biblio
An Efficient Anonymous System for Transaction Data
Submitted by grigby1 on Thu, 05/18/2017 - 2:20pm
aonymous
Human behavior
k-anonymity
Kerberos
Metrics
pubcrawl
Resiliency
set-valued
Transaction Data
TSP
biblio
Face de-identification using facial identity preserving features
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
facial images
surveillance
social networking (online)
pubcrawl170113
privacy-preserving social media
privacy protection
privacy
machine learning
learning (artificial intelligence)
k-anonymity facial image de-identification
k-anonymity
intra-identity variances
intelligent surveillance applications
image recognition
Active appearance model
facial image identity recognition
facial identity preserving features
face representation
face recognition
face de-identification
face blurring techniques
Face
deep learning-based facial identity-preserving features
deep learning
Databases
data privacy
automated human facial image de-identification
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 2:16pm
Mobile communication
wireless sensor networks
user privacy protection
sensors
security of data
privacy level
privacy
performance evaluation
participatory sensing
mobile phones
Mobile handsets
mobile devices
mobile computing
ban zones
map-based silent zones
location data
large-scale sensing systems
k-anonymity
habitat density
embedded sensors
dynamic map-based blinding out
data privacy
Cities and towns
cartography
Buildings
« first
‹ previous
1
2
3