Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
sensitive data
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
Metrics
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
big data security
markov chain
encryption
Encrypted Clustering
edge computing
data structures
data privacy
data control
Cryptography
cloud-based solutions
cloud service providers
cloud provider
Cloud Computing
big dataset clustering
big data encryption
Big Data
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
path-based dissimilarity function
Walk2Privacy mechanism
Walk2Privacy algorithm
Task Analysis
Target link privacy preserving
target link privacy disclosure
Switches
submodularity property
social networking (online)
self-avoiding random walk
scale social graphs
Scalability
pubcrawl
privacy
adversarial link prediction
monotonicity property
Link prediction
Link deletion.
Indexes
greedy link deletion
Graph utility
graph theory
GLD2Privacy mechanism
data privacy
data deletion
Computational modeling
Big Data
biblio
Cybercrime Countermeasure of Insider Threat Investigation
Submitted by grigby1 on Fri, 07/03/2020 - 12:26pm
DPI method
Scalability
Resiliency
resilience
pubcrawl
Organizations
Online banking
law enforcement
Inspection
insider threat investigation
insider threat
Big Data
digital investigation process
digital evidence
deep packet inspection methods
deep packet inspection
cybercrime threats
cybercrime investigation
cybercrime insider investigation
cybercrime countermeasure
Computer crime
biblio
Enhancing Big Data Security using Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 06/26/2020 - 11:55am
map reduce Hadoop
Servers
security of data
security and privacy
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
Big Data
Indium tin oxide
Elliptic curve cryptography
data processing technology
data distribution
data configuration
data analysis
big data security
big data analytics.
biblio
Application of Improved Image Hash Algorithm in Image Tamper Detection
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
image tamper detection
Transportation
smart cities
ROC curve
ring segmentation
ring segment
ring region
Resiliency
resilience
random vector
pubcrawl
measurement vector
improved image hashing algorithm
image tampering detection
Annular Segmentation
image segmentation
image hashing technique
image
hash value
hash algorithms
hash algorithm
feature extraction
detection
Cryptography
Conferences
compressed sensing
Compositionality
Big Data
biblio
Smart Transportation Delay and Resiliency Testbed Based on Information Flow of Things Middleware
Submitted by aekwall on Mon, 06/01/2020 - 9:53am
policy-based governance
Transportation
time-sensitive distributed smart transportation systems
telecommunication traffic
Task Analysis
smart transportation delay
sensors
security of data
security
routing service
resiliency testbed
Resiliency
resilience
real-time data-driven applications
quality of service
pubcrawl
Anomaly Detection
middleware security
middleware
IoT devices
Internet of Things
information flow of things middleware
fog computing paradigms
edge computing paradigms
distributed processing platform
distributed computing
delays
decentralized traffic speed query
decentralized anomaly detection approach
composability
Cloud Computing
Big Data
biblio
Security of Medical Big Data Images using Decoy Technique
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
MRI reports
honey-pot
honeypot intrusion detection
Human Factors
Intrusion Detection
Medical Big Data
medical Big Data image security
medical image processing
Medical services
honey pots
pubcrawl
radiology
Resiliency
Scalability
security
security of data
teleradiology
X-rays
Databases
automation
Big Data
Biomedical imaging
biomedical MRI
biomedical telemetry
Cloud Computing
computerised tomography
CT scans
big data security
Decoy
decoy technique
diagnostic radiography
EHR security
electronic health records
health care
healthcare cloud
healthcare units
biblio
An Application of Storage-Optimal MatDot Codes for Coded Matrix Multiplication: Fast k-Nearest Neighbors Estimation
Submitted by grigby1 on Fri, 05/22/2020 - 1:39pm
parallel processing
faster query execution
high memory footprint
in-memory indexes
K-NN search
MatDot codes
matrix multiplication
model parallelism
model-parallel architecture
MRPT
multiple random projection trees
nearest neighbor estimation
fast k-nearest neighbors
query response time
query time
single compute node
single processing node
storage constraints
storage-optimal MatDot Codes
storage-optimal recovery threshold
straggler and failure tolerance
straggler-prone environment
Systematics
worker nodes
nearest neighbor search
Indexes
Data models
Computational modeling
Big Data
trees (mathematics)
Metrics
Measurement
nearest neighbour methods
data storage
query processing
mathematics computing
pubcrawl
high-dimensional data
Approximation algorithms
approximate nearest neighbor algorithms
candidate points
coded computing
coded matrix multiplication
computation efforts
computation strategy
distributed computing cluster
distributed processing
Euclidean distance calculations
biblio
K-nearest Neighbor Search by Random Projection Forests
Submitted by grigby1 on Fri, 05/22/2020 - 1:38pm
Clustering algorithms
Vegetation
tree-based methodology
rpForests
random projection forests
multicore computers
kNN search
kNN distances
exponential decay
ensemble size
ensemble random projection trees
ensemble methods
Ensemble
clustered computers
nearest neighbor search
k-nearest neighbor search
learning (artificial intelligence)
search problems
computational complexity
k-nearest neighbors
nearest neighbour methods
Measurement
Metrics
Big Data
random forests
pubcrawl
Unsupervised Learning
Forestry
Data mining
machine learning algorithms
machine learning
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »