Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Sanitization
biblio
MuTrack: Multiparameter Based Indoor Passive Tracking System Using Commodity WiFi
Submitted by grigby1 on Tue, 02/16/2021 - 12:26pm
parameter estimation
DFLT system
home security
Hungarian Kalman filter
indoor environment
indoor passive tracking system
low-resolution parameter estimates
multi-dimensional parameters
multidimensional parameters estimator
multiparameter based indoor passive tracking system
MuTrack
device-free localization-tracking
path components
path parameters
Radar tracking
random phase errors
receiving antennas
reference antenna
reliability index
signal sanitization
weak target echoes
WiFi signal
wireless LAN
pubcrawl
Human behavior
resilience
Resiliency
Indexes
target tracking
Reliability
Compositionality
tracking
Wireless fidelity
privacy
indoor radio
Kalman filters
Data Sanitization
elderly care
WiFi
background clutter signals
Clutter
commodity WiFi devices
conjugate operation
contactless awareness applications
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 12:25pm
network information preservation
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
Bayes methods
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
Compositionality
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
privacy
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
biblio
The Minimum Cost of Information Erasure for Stationary Memoryless Sources under Restriction on the Output Distribution
Submitted by grigby1 on Tue, 02/16/2021 - 12:25pm
general sources
unrelated sequence
uniformly distributed sequences
stationary memoryless sources
single-letter characterization
Random sequences
random sequence
output distribution
minimum cost
memoryless systems
information erasure
privacy
conditional resolvability
Data Sanitization
source coding
Information Leakage
confidential information
Compositionality
Resiliency
resilience
Human behavior
pubcrawl
biblio
Privacy-Aware Quickest Change Detection
Submitted by grigby1 on Tue, 02/16/2021 - 12:25pm
GLRT statistic
quickest detection
Quickest change detection
QCD problem
properly designed sanitization channel
privacy-aware quickest change detection problem
privacy constraint
privacy considerations
optimization problem
Optimal Stopping Time
Maximal Leakage
Lorden's minimax formulation
information privacy requirements
privacy
GLR CuSum
generalized likelihood ratio CuSum
control charts
Data Sanitization
minimax techniques
Compositionality
data privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Group Key Management in Cloud for Shared Media Sanitization
Submitted by grigby1 on Tue, 02/16/2021 - 12:24pm
Data Sanitization
security
resilience
Remote Key Management Services
pubcrawl
privacy
Media
Key Management Services
Handheld computers
grid computing
encryption
key management
Crypto Shredding
Compositionality
Cloud Security
cloud computing security
Cloud Computing
Client-side Key Management Services
Human behavior
Metrics
Resiliency
Scalability
biblio
A GA-based Data Sanitization for Hiding Sensitive Information with Multi-Thresholds Constraint
Submitted by grigby1 on Tue, 02/16/2021 - 12:24pm
privacy preservation
multi-threshold
Itemsets
Data Sanitization
Statistics
Sociology
genetic algorithm
genetic algorithms
optimization
Compositionality
privacy
Data mining
Databases
Data models
security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Challenges and Designs for Secure Deletion in Storage Systems
Submitted by aekwall on Mon, 01/11/2021 - 12:30pm
data scrubbing
data deletion
user data protection
storage systems
secure deletion
programming strategy
magnetic recording
legal compliance requirements
hard disk drives
flash-based solid-state drives
disc drives
deletion design security
security of data
Hard disks
flash memories
Data Sanitization
Law
storage management
privacy
pubcrawl
encryption
Data Security
Scalability
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 1:14pm
Policy
managed security service
managed security service provider
Managed security services
Monitoring
MSS platform customers
MSSP
multi-tenant
organization
outsourcing
Peer-to-peer computing
platform solution
large-scale enterprises
policy-based governance
Portals
privacy
privacy concerns
private sectors
pubcrawl
public sectors
security of data
Security Policies Analysis
Task Analysis
use case
data anonymization
business data processing
cloud service
collaboration
collaborative data sharing
component
computer security
confidential data sharing
cyber security
cyber security data sharing
cyber security information
cybercrimes
architecture
data encryption
data privacy
Data Sanitization
data sharing
design
diagram
flexible data sharing
information
Lakes
large-scale enterprise
biblio
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization
Submitted by grigby1 on Thu, 07/09/2020 - 12:58pm
Security Properties
Human behavior
Human Factors
mobile client
mobile computing
privacy
pubcrawl
public blockchain
resilience
Resiliency
Scalability
hardware-assisted transparent enclave
sensor-rich mobile devices
SGX-enabled server
smart contract
smart contracts
Task Analysis
third-party platform
transparent blockchain
trusted hardware
zero-knowledge proof
data confidentiality
blockchain
Compositionality
crowd wisdom
crowd wisdom aggregation
Crowdsensing
crowdsensing systems
Cryptography
data aggregation
Data collection
Aggregates
data deletion
data privacy
Data Sanitization
data sensing
decentralized blockchain technology
differential privacy
Distributed databases
ethereum
faulty data providers
biblio
Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Submitted by grigby1 on Thu, 07/09/2020 - 12:58pm
privacy analysis
word representations
vast data stores
utility experiments highlight
user privacy
training machine learning models
text analysis
supporting data driven decisions
semantic generalization
Scalability
Resiliency
resilience
pubcrawl
proof satisfying dx-privacy
probability
privacy experiments
arbitrary piece
privacy
nonHamming distance metrics
learning (artificial intelligence)
Human Factors
Human behavior
high dimensional hyperbolic space
hierarchical representations
expected privacy
downstream machine learning models
document redaction
differential privacy
Data Sanitization
data privacy
data deletion
Compositionality
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »