Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
patient privacy
biblio
A Hybrid Density-Based Outlier Detection Model for Privacy in Electronic Patient Record system
Submitted by grigby1 on Mon, 06/06/2022 - 12:57pm
information security
machine learning
security
Anomaly Detection
pubcrawl
Analytical models
Scalability
Data models
privacy
Medical services
Human Factors
visualisation
human in the loop
Electronic Patient Records
Healthcare Infrastructures
patient privacy
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
NRF: A Naive Re-Identification Framework
Submitted by grigby1 on Wed, 10/23/2019 - 12:35pm
data privacy
formal privacy model
Human behavior
Human Factors
Metrics
patient privacy
probabilistic framework
pubcrawl
re-identification risk
resilience
Resiliency
Scalability
Security Risk Estimation
biblio
Blockchain: Solving the Privacy and Research Availability Tradeoff for EHR Data: A New Disruptive Technology in Health Data Management
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
policy maker institutions
health system developers
Human Factors
law regulations
lifelong recorded patient health data
Medical services
multisignature data access
patient data
patient privacy
Health information ecosystem
policy makers
population health management
privacy
privacy data
protective principles
pubcrawl
Scalability
secure data storing
defensive data hiding attitude
blockchain
blockchain technology
Business
cryptographically secured data storage
Cryptography
data availability
data privacy
data structures
American HIPAA regulation
disruptive technology
EHR
EHR data
electronic health records
ethical problems
expert systems
health data management
Health data storage
biblio
An Adaptive Differential Privacy Algorithm for Range Queries over Healthcare Data
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
medical information systems
Sensitivity
Scalability
Resiliency
range queries
query processing
pubcrawl
privacy
patient privacy
partitioning mechanisms
Partitioning algorithms
adaptive differential privacy algorithm
medical data
Human behavior
Healthcare Data Privacy
healthcare data
health care
greedy algorithms
diseases
differential privacy
data privacy
composability
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers