Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy analysis
biblio
Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
iterative process
Scalability
Resiliency
recycled ADMM
R-ADMM
pubcrawl
privacy-utility tradeoff
privacy analysis
privacy
Perturbation methods
optimization
local data
linear approximation
alternating direction method of multiplier
Iterative methods
Human behavior
distributed algorithms
differential privacy
decentralized convex optimization problems
data privacy
convex programming
Convex functions
convergence
Computing Theory and Privacy
approximation theory
biblio
Privacy Mining of Large-scale Mobile Usage Data
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
machine learning tools
android
mobile devices
ios
iOS (operating system)
mobile network
privacy leakage detection
iOS Security
iOS system
inference mechanisms
mobile privacy leakage
mobile traffic data
mobile usage data
privacy analysis
privacy detection model
privacy inference mining
privacy mining
private usage patterns
data privacy
security of data
data analysis
Data mining
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
learning (artificial intelligence)
privacy
Object recognition
mobile computing
smart phones
Metrics
Compositionality
password
biblio
Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Submitted by grigby1 on Thu, 07/09/2020 - 1:58pm
privacy analysis
word representations
vast data stores
utility experiments highlight
user privacy
training machine learning models
text analysis
supporting data driven decisions
semantic generalization
Scalability
Resiliency
resilience
pubcrawl
proof satisfying dx-privacy
probability
privacy experiments
arbitrary piece
privacy
nonHamming distance metrics
learning (artificial intelligence)
Human Factors
Human behavior
high dimensional hyperbolic space
hierarchical representations
expected privacy
downstream machine learning models
document redaction
differential privacy
Data Sanitization
data privacy
data deletion
Compositionality
biblio
Trajectory-observers of timed stochastic discrete event systems: Applications to privacy analysis
Submitted by aekwall on Mon, 04/20/2020 - 10:32am
Discrete event system
privacy models and measurement
timed stochastic Petri net models
timed stochastic discrete event systems
stochastic petri nets
privacy analysis
Observers
Markov model
language-based opacity
k-step trajectory-observer
security
Stochastic processes
discrete event systems
Petri nets
privacy
Metrics
pubcrawl
data privacy
security of data
biblio
A Linear Distinguisher and Its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation
Submitted by grigby1 on Mon, 12/16/2019 - 3:54pm
ciphertext-only attack
Control Theory
Cyber Physical System
cyber physical systems
Human behavior
Indistinguishability
privacy
privacy analysis
privacy-preserving verifiable (outsourced) computation
pubcrawl
resilience
Resiliency
Scalability
biblio
A variant of schnorr signature scheme for path-checking in RFID-based supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
pubcrawl170112
telecommunication security
supply chains
supply chain management
Supply Chain
Security analysis
Schnorr signature
RFID-based supply chains
RFID technology
RFID
radiofrequency identification
authentication
Protocols
privacy analysis
privacy
path-checking protocols
path-checking
modified schnorr signature scheme
Generators
data privacy
check reader
biblio
"Verification for Security-Relevant Properties and Hyperproperties"
Submitted by grigby1 on Thu, 02/23/2017 - 12:37pm
model checking
wireless sensor networks
verification
Time factors
security-relevant property verification
security-relevant properties
security policy
Safety
pubcrawl
program verification
privacy analysis
Access Control
liveness
hyperproperty verification
hyperproperty
fairness
embedded systems
pubcrawl170105
data privacy preservation
data privacy
Computational modeling