Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
inference attacks
biblio
A Survey on Security and Privacy Threats to Federated Learning
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
policy-based governance
security weaknesses
security threat
Resists
Resiliency
resilience
pubcrawl
Protocols
Privacy-preserving
privacy
Collaborative Work
poisoning attacks
inference attacks
IEEE standards
Human behavior
generative adversarial networks
GAN attacks.
federated learning
Computational modeling
biblio
A Web Application for Prevention of Inference Attacks using Crowd Sourcing in Social Networks
Submitted by grigby1 on Tue, 04/12/2022 - 12:19pm
Compositionality
inference attacks
data loss
Adaptive based algorithms
Limiting
social networks
Data Sanitization
education
social networking (online)
Clustering algorithms
Peer-to-peer computing
Crowd Sourcing
Classification algorithms
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
biblio
What Else is Revealed by Order-Revealing Encryption?
Submitted by grigby1 on Mon, 07/24/2017 - 1:59pm
audits
Compositionality
database encryption
encryption
encryption audits
inference attacks
Metrics
order-revealing encryption
pubcrawl
resilience