Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge computing
biblio
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices
Submitted by aekwall on Mon, 09/14/2020 - 12:28pm
Privacy-preserving
composability
smart IoT devices
smart Internet of Things (IoT) devices
privacy-preserving outsourced speech recognition
outsourced privacy-preserving speech recognition framework
neural network-based speech recognition
long short-term memory neural network
long short-term memory (LSTM)
intelligent IoT device voice control
human-machine interaction interface
forward propagation (FP)
Back propagation through time (BPTT)
additive secret sharing-based interactive protocols
data privacy
Speech recognition
edge computing
recurrent neural nets
Logic gates
Neural networks
Cryptography
privacy
pubcrawl
privacy leakage
Protocols
distributed processing
Internet of Things
biblio
Multi-Authority Attribute-Based Encryption for Resource-Constrained Users in Edge Computing
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
Computational modeling
outsourced decryption
Online/Offline Encryption
multiauthority attribute-based encryption
Multi-Authority Attribute-Based Encryption
MA-ABE schemes
large-universe MA-CP-ABE scheme
ciphertext pool
encryption algorithm
Performance analysis
fine-grained access control
edge computing
IoT
policy-based governance
pubcrawl
Human behavior
Internet of Things
attribute-based encryption
data privacy
Access Control
encryption
Cryptography
authorisation
Scalability
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
Electrocardiography
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
ethereum
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
resilience
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
Logic gates
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
sensitive data
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
Metrics
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
big data security
markov chain
encryption
Encrypted Clustering
edge computing
data structures
data privacy
data control
Cryptography
cloud-based solutions
cloud service providers
cloud provider
Cloud Computing
big dataset clustering
big data encryption
Big Data
biblio
An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
irrelevant random blocks
last mile problem
linear codes
linear coding
Metrics
original data blocks
orthogonal vector
policy-based governance
pubcrawl
information theoretical security
Resiliency
Scalability
secure edge
security of data
unreliable edge nodes
user device
Vectors
widespread solution
Decoding
security
actual EC deployments
Cloud Computing
communication overhead
computational complexity
compute-intensive applications
data confidentiality
data matrix
Data Security
coding theory
edge computing
edge devices
efficient edge
efficient secure coded edge computing scheme
high decoding complexities
Human behavior
Human Factors
information theoretic security
biblio
Agent Based Fog Architecture using NDN and Trust Management for IoT
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
robust system
IoT generation
multi-agent systems
Named Data Network Security
Named Data Network(NDN)
NDN
present-day network infrastructure
pubcrawl
resilience
Resiliency
IoT devices
Scalability
secured named data network protocol
secured system
security
Servers
service-oriented architecture
traffic usage reduction
Trust management
drastic rate
agent based composition model
agent society
caching layer
Cloud Computing
Computational modeling
computer architecture
computer network security
Data models
Agent Based Communication
edge computing
fog architecture
fog based agent model
Fog computing
fog layer
Human behavior
Internet of Things
Internet of Things (IoT)
biblio
Enabling Adaptive Deep Neural Networks for Video Surveillance in Distributed Edge Clouds
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
video surveillance
two-stage delay-aware graph searching approach
task scheduling
remote clouds
network delay
network cameras
intelligent video surveillance task scheduling problem
input video segment
feature similarity
distributed edge clouds
computing delay
adaptive DNN model selection method
adaptive deep neural networks
NP-hard
Computation offloading
deep neural networks
Cloud Computing
scheduling
edge computing
video signal processing
image segmentation
computational complexity
resource allocation
neural nets
Metrics
graph theory
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Performance Modeling and Assessment of Unified Video Surveillance System Based on Ubiquitous SG-eIoT
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
Fog computing
video terminals
unified video surveillance system
ubiquitous SG-eIoT
service latency parameters
service latency
Performance modeling
network load
electric Internet of Things(eIoT)
edge eIoT agent
video surveillance
Streaming media
Cloud Computing
Logic gates
Cameras
video signal processing
edge computing
delays
Metrics
pubcrawl
Human behavior
Resiliency
power aware computing
Internet of Things
biblio
Implementation of Platform Controller and Process Modules of the Edge Computing for IoT Platform
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
edge computing
Human Factors
Pervasive Computing Security
wide area network
process modules
process control
platform controller
IoT platform
edge nodes
distributed processing
data-processing flows
container-based virtualization technology
container technology
encryption
Containers
IoT
Human behavior
resilience
Resiliency
Metrics
pubcrawl
Virtualization
virtualisation
Scalability
computer network security
Internet of Things
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »