Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
online social networks
biblio
AtNE-Trust: Attributed Trust Network Embedding for Trust Prediction in Online Social Networks
Submitted by aekwall on Tue, 06/01/2021 - 12:27pm
Employment
trust prediction
social networking (online)
Resiliency
pubcrawl
Predictive models
online social networks
Human Factors
Fuses
Computing Theory
Decision Making
Data models
Data mining
Computing Theory and Trust
composability
Attributed network embedding
trust
biblio
DeepTrust: A Deep User Model of Homophily Effect for Trust Prediction
Submitted by grigby1 on Wed, 12/02/2020 - 1:16pm
pair-wise deep neural network
user similarity measurement
user review behavior
user modeling
user feature vector cosine similarity
Trusted Computing
trust prediction
trust network
trust
social networking (online)
pubcrawl
product promotion
Computing Theory
online social networks
neural nets
information dissemination
Human Factors
Human behavior
economic networks
DeepTrust
deep user model
Decision Making
data sparsity insensitive model
biblio
HSDC–Net: Secure Anonymous Messaging in Online Social Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
Scalability
messaging application providers
online social networks
practical protocol
privacy
protocol design
Protocols
pubcrawl
resilience
Resiliency
message senders
SDC-net
secure anonymous messaging
security issues
Servers
short stability issue
social networking (online)
strongest anonymity guarantees
trust ISP
DC–net
anonymous communications
anonymous messaging
Australia
blockchain users
computer network security
Cryptographic Protocols
Cryptography
data privacy
DC-net suffers
anonymization
dining cryptographers network protocol
disruption management
disruption management subprotocols
hiding contents
HSDC-net achieves low latencies
HSDC-net protocol
internet
message publishing
biblio
Check-It: A plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web
Submitted by aekwall on Mon, 07/13/2020 - 10:19am
Artificial Intelligence
Web browser plugin
News Content
fake news identification
fake news detection
domain flag-lists
Check-It
web of trust
misinformation
artificial intelligence techniques
online front-ends
user privacy
feature extraction
Uniform resource locators
Browsers
Linguistics
Analytical models
internet
social networking (online)
online social networks
composability
pubcrawl
Resiliency
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
A Review on Self Destructing Data:Solution for Privacy Risks in OSNs
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
privacy
social networking (online)
Servers
self destructing data
security risks
security of data
security
Scalability
risk management
pubcrawl
privacy violations
privacy settings
privacy risks
Cryptography
OSN user
OSN server
OSN providers
online social networks
online social network users
internet
file servers
Facebook
delays
data privacy
data deletion
biblio
Oases: An Online Scalable Spam Detection System for Social Networks
Submitted by aekwall on Mon, 02/25/2019 - 10:42am
social communities
DHT based overlay
Distributed databases
load-balancing
malware disseminators
Oases
online scalable spam detection system
progressive aggregation tree
resource allocation
decentralized DHT-based tree overlay deployment
social spam
spam classifiers
spammers
trees (mathematics)
Twitter data
Vegetation
Web-based social networks
Metrics
invasive software
Human behavior
pubcrawl
Routing
Peer-to-peer computing
online social networks
social networking (online)
Twitter
Scalability
pattern classification
internet
unsolicited e-mail
spam detection
Training
community-based opportunities
content polluters
biblio
Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
malicious activities
Twitter
Sybil SAN
sybil detection
sybil defenses
sybil attacks
social-activity networks
social networking (online)
social activity network
security of data
pubcrawl
perturbation theory
online social networks
Metrics
matrix perturbation theory
matrix algebra
activity attacks
low detection accuracy
Iterative methods
iterative algorithm
Image edge detection
graph-based sybil detection
graph theory
friendship attacks
fake accounts
Facebook
detection metric
detection algorithms
convergence
Computational modeling
composability
Algorithms
biblio
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
real-time crowdsourced maps
large-scale simulations
location privacy
map systems
Mobile handsets
one-time physical co-location
online social networks
points-of-interest
privacy
privacy attacks
large proximity graphs
Roads
security attacks
single Sybil device
software-based Sybil devices
strong location authentication
sybil attacks
virtual vehicles
Waze
Metrics
cartography
data privacy
telecommunication security
mobile computing
real-time systems
pubcrawl
composability
Sybil attack
Accidents
automatic user traffic rerouting
traffic engineering computing
co-location edges
crowdsourced mobile mapping services
crowdsourcing
false congestion
ghost riders
Global Positioning System
Google
Google team
graph theory
biblio
An Efficient Algorithm for Minimal Edit Cost of Graph Degree Anonymity
Submitted by grigby1 on Thu, 01/31/2019 - 11:19am
online social networks
Switches
social networks
social networking (online)
Social network services
social network graphs
social network data
Resiliency
resilience
pubcrawl
privacy
personal privacy
optimization
anonymity
Metrics
Human Factors
Human behavior
Heuristic algorithms
graph theory
graph k-degree anonymity
dynamic programming
delete edges
degree anonymity
data privacy
composability
1
2
next ›
last »