Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170105
biblio
"A Dynamic Supervisory Mechanism of Process Behaviors Based on Dalvik VM"
Submitted by grigby1 on Thu, 02/23/2017 - 12:34pm
malware
system security sensitive behavior
system resource monitoring
system resource auditing
supervisory proces
spy privacy
smartphone security threats
smart phones
security
pubcrawl170105
private information
mobile phones
android
malicious chargeback software
Java
Humanoid robots
framework
dynamic supervisory mechanism
data privacy
Dalvik VM
Cameras
Androids
Android operating system
Android (operating system)
biblio
"Towards Making Systems Forget with Machine Unlearning"
Submitted by grigby1 on Thu, 02/23/2017 - 12:32pm
machine learning algorithms
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
pubcrawl170105
pubcrawl
privacy risks
machine unlearning
Adversarial Machine Learning
Learning systems
learning (artificial intelligence)
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
biblio
"Using Honey Templates to Augment Hash Based Biometric Template Protection"
Submitted by grigby1 on Thu, 02/23/2017 - 12:30pm
hash
Sugar
Servers
secure sketch
pubcrawl
privacy leakage concern
machine learning based protected template generation protocol
learning (artificial intelligence)
honeywords
honeyword
honey templates
honey template
hashed password cracking
hash based BTPS
hash based biometric template protection
authentication
fuzzy vault
fuzzy commitment
Databases
database leakage
Data protection
data privacy
Cryptography
cryptographic hash calculation
biometrics (access control)
biometric template verification
biometric template storage
pubcrawl170105
biometric template protection
biometric template database leakage detectability
biblio
"Pattern classification under attack on spam filtering"
Submitted by grigby1 on Thu, 02/23/2017 - 12:26pm
privacy
unsolicited e-mail
spam filtering
spam email security evaluation
spam attack scenario
security of data
security issues
Security Evaluation
security
pubcrawl
adversarial attacks
pattern classification system
pattern classification
filtering algorithms
Filtering
Electronic mail
pubcrawl170105
Classification algorithms
adversarial classification
biblio
Malicious behavior in online social network
Submitted by grigby1 on Thu, 02/23/2017 - 12:17pm
content
estimation
malicious behavior
online social network
OSN
OSNs
post
privacy
Protocols
security
security of data
social networking (online)
Suspensions
Twitter
user
pubcrawl170105
biblio
"Discovery of De-identification Policies Considering Re-identification Risks and Information Loss"
Submitted by grigby1 on Thu, 02/23/2017 - 12:14pm
Lattices
Upper bound
UCI machine learning repository
Synthetic aperture sonar
Safe Harbor
risk analysis
reidentification risks
pubcrawl170105
privacy leakage
privacy
learning (artificial intelligence)
Computational modeling
information loss
information entropy
HIPPA
Entropy
deidentified data
deidentification policies
de-identification
data privacy
data analysis
biblio
"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)"
Submitted by grigby1 on Thu, 02/23/2017 - 12:12pm
mobile computing
wireless network technology
security of data
Repudiation
replay attack
pubcrawl170105
Protocols
privacy protection
privacy
mobile payment protocol
Mobile handsets
mobile devices
client centric model
Mobile communication
key agreement protocol
golden mobile pay center protocol
Golden Circle
GMPCP
GC
financial management
cyber security
Cryptography
Complexity theory
biblio
"DIVa: Decentralized identity validation for social networks"
Submitted by grigby1 on Thu, 02/23/2017 - 12:05pm
learning (artificial intelligence)
user profile attribute
social networking (online)
Social network services
security
real-world OSN dataset
pubcrawl170105
Privacy-preserving Learning
privacy preservation
privacy
online social network
mining technique
association rules
fine-grained community-aware correlation
Ensemble Learning
DIVa
Decentralized Online Social Networks
decentralized learning approach
decentralized identity validation
data privacy
Data mining
Correlation
Computational modeling
Community-aware Identity Validation
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 12:02pm
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
"De-identification of Textual Data Using Immune System for Privacy Preserving in Big Data"
Submitted by grigby1 on Thu, 02/23/2017 - 11:45am
immune systems
textual data de-identification
text analysis
specific immune system algorithm
security
pubcrawl170105
privacy preserving
privacy
Informatics
Big Data
Immune system
de-identification
data privacy
Data models
Data mining
Cryptography
CLONALG
« first
‹ previous
1
2
3
next ›
last »