Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information loss
biblio
Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Games
optimized k selection
optimal anonymization level
k-anonymization technique
different Nash equilibria solutions
data record
game-theoretic framework
information loss
game-theoretic approach
game theoretic security
Predictive Metrics
Human Factors
Scalability
Mathematical model
simulation
privacy
privacy preservation
pubcrawl
Resiliency
game theory
security
Organizations
data privacy
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
biblio
Balancing Data Utility versus Information Loss in Data-Privacy Protection using k-Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
machine learning algorithms
Resiliency
resilience
pubcrawl
process control
privacy protection
privacy
Neural networks
Metrics
anonymity
machine learning
k-anonymity
information loss
Human behavior
data utility
data privacy
composability
Classification algorithms
biblio
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold
Submitted by grigby1 on Fri, 07/10/2020 - 11:40am
private data exposure
learning (artificial intelligence)
manifold
Manifolds
medical information systems
medical research
multigrid
multigrid solver method
privacy
privacy exposure risk
privacy legislation
information loss
Probabilistic logic
probability
pubcrawl
quasiidentifiers
Scalability
security of data
strong guarantees
thwarts de-anonymisation
treatment data
data anonymity
attribute combination
attribute pairs
attribute separation
Bayes methods
Bayesian networks
Bayesian networks optimised
belief networks
case agnostic method
Data Anonymisation
anonymisation algorithms
data deletion
Data models
data privacy
data transformation
Distributed databases
distributed high-dimensional data repositories
distributed high-dimensional health data silos
high conditional probability
identifying data exposure
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Differential Privacy Data Protection Method Based on Clustering
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
information loss
Scalability
risk reduction
Resiliency
pubcrawl
privacy protection
pattern clustering
numerical attribute
mixed data
Knowledge Discovery
insensitive clustering method
insensitive clustering algorithm
categorical attribute
information disclosure
ICMD-DP method
Human behavior
distributed computing
differential privacy data protection method
differential privacy
data privacy
data availability
composability
clustering
biblio
Research on K Anonymity Algorithm Based on Association Analysis of Data Utility
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
K anonymity
Resiliency
resilience
Publishing
pubcrawl
Privacy preserve
principal component analysis
personal privacy information
personal identity
PCA-GRA K anonymous algorithm
optimization
Metrics
medical information systems
medical data privacy
K anonymity algorithm
Algorithm design and analysis
information loss
Human behavior
grey systems
Grey relational analysis K anonymous algorithm
feature maintenance
data utility
data privacy
data analysis
correlation coefficient
Correlation
composability
classification evaluation performance
association analysis
anonymity
1
2
next ›
last »