Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive data
biblio
Security Protection of Research Sensitive Data Based on Blockchain
Submitted by grigby1 on Thu, 09/07/2023 - 3:59pm
Access Control
extensibility
controlled sharing
blockchains
smart contracts
data structures
composability
data encryption
process control
Logic gates
sensitive data
intellectual property
Resiliency
resilience
policy-based governance
pubcrawl
security
biblio
A Safe Approach to Sensitive Dropout Data Collection Systems by Utilizing Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 11:33am
sensitive data
Dropout
Homomorphic encryption
Technological innovation
data leakage
Manuals
Databases
data privacy
Scalability
Computer hacking
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Data collection
biblio
A Meta-Analysis of Efficient Countermeasures for Data Security
Submitted by grigby1 on Fri, 07/14/2023 - 10:48am
Training data
encryption audits
sensitive data
security risks
data attacks
threats
Resiliency
Data protection
renewable energy sources
feature extraction
Compositionality
Data Security
security vulnerabilities
Companies
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
A Secure Workflow for Shared HPC Systems
Submitted by grigby1 on Fri, 03/03/2023 - 12:15pm
Cloud Computing
security
pubcrawl
Human Factors
Metrics
resilience
Resiliency
sensitive data
Virtualization
Reliability
Compositionality
operating systems
High performance computing
iOS Security
Secure computing
biblio
PReDIHERO – Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring
Submitted by grigby1 on Tue, 05/24/2022 - 1:51pm
Metrics
sensitive data
Random mask
inference
Constrained
Computational efficiency
outsourcing
neural network
Homomorphic encryption
Compositionality
deep learning
composability
Information Assurance
Medical services
privacy
Additives
Resiliency
resilience
Human behavior
pubcrawl
biblio
Where is our data? A Blockchain-based Information Chain of Custody Model for Privacy Improvement
Submitted by aekwall on Wed, 04/13/2022 - 10:20am
blockchain
chain of custody
data deletion
Data models
data privacy
health data
information management
Insurance
privacy
Prototypes
pubcrawl
Scalability
sensitive data
tools
Traceability
Urban areas
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
resilience
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
open-source nature
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
device manufacturers
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
Android (operating system)
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
biblio
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Submitted by aekwall on Mon, 02/01/2021 - 11:43am
DNN-based image translation attack
attacker-chosen disease condition
attacking medical image diagnostics
biomedical image
biomedical imagery
biomedical optical imaging
deep generative models
deep learning tools
defenses
neural style transfer
eye
healthcare domain
Jekyll
medical domain
medical image diagnostics
neural style transfer framework
patient healthcare
retinal fundus image modalities
image segmentation
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
deep learning
neural nets
image watermarking
attacks
Scalability
Generative Models
Predictive Metrics
deep neural networks
sensitive data
medical image processing
medical images
diseases
medical professionals
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
Resiliency
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Metrics
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
Data protection
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
android encryption
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
image colour analysis
text-to-image encryption algorithms
Text-to-Image Encryption
survey
RSA and AES
RGB Value
RGB color value
keeping data
global network
data encryption techniques
Comparison
Asymmetric Encryption
symmetric encryption algorithms
asymmetric encryption algorithms
sensitive data
Cryptography
Software algorithms
public key cryptography
Public key
Image color analysis
text analysis
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
Receivers
encryption
1
2
3
4
5
next ›
last »