Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
differential attacks
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:42pm
convergence analysis
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
Stochastic processes
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
composability
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
security of data
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
biblio
White-Box Cryptography Based Data Encryption-Decryption Scheme for IoT Environment
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
IoT environment
white-box cryptography based data encryption-decryption scheme
white-box cryptography
White Box Security
white box cryptography
transportation monitoring
symmetric encryptions algorithms
resource constrained environments
Resiliency
resilience
pubcrawl
pedestrian levels
Metrics
medical devices
Matrix decomposition
manufacturing process
advanced encryption standard
IoT devices
Internet of Things
infusion pumps
implanted devices
encryption
encoding
differential attacks
Cryptography
computer network security
composability
code lifting attacks
Ciphers
cipher block chaining mode
CBC mode.
Block Cipher
biblio
Privacy-Preserving and Multi-Dimensional Range Query in Two-Tiered Wireless Sensor Networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:39pm
multidimensional range query protocol
wireless sensor networks
two-tiered wireless sensor networks
Silicon
sensor electronic devices
Resiliency
resilience
query processing
pubcrawl
Protocols
probability attacks
privacy-preserving range query
PERQ
network accountability
Biomedical monitoring
Monitoring
modular arithmetic range query mechanism
Metrics
Heart rate
generalized distance-based range query mechanism
differential attacks
data privacy
data integrity
cyclic modular verification scheme
Cryptographic Protocols
composability
Collusion Attacks
biblio
Quantum color image encryption based on multiple discrete chaotic systems
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
logistic Chebyshev map
XOR operation
statistical attacks
Resiliency
quantum image encryption algorithm
quantum encryption algorithm
quantum cryptography
quantum controlled-NOT image
quantum color image encryption
pubcrawl
multiple discrete chaotic systems
Metrics
Logistics
Algorithm design and analysis
image colour analysis
Histograms
encryption process
encryption
differential attacks
composability
Color
Chebyshev approximation
chaotic logistic map
chaotic cryptography
chaos
asymmetric tent map