Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Fast and Secure kNN Query Processing in Cloud Computing
Submitted by aekwall on Mon, 02/22/2021 - 1:44pm
RBF
untrusted cloud
tracking technology
secure range query protocol
secure location-based query
secure index
random Bloom filter
process location-based queries
LSPs
geospatial data storage
FSkNN
fast location-based query
fast and secure kNN query processing
data structure
commercial public clouds
Geospatial analysis
Cloud Computing
nearest neighbor search
location based services
location-based services
Predictive Metrics
Indexes
Measurement
data structures
query processing
pubcrawl
nearest neighbour methods
Protocols
data privacy
encrypted data
Cryptography
biblio
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
Submitted by aekwall on Mon, 02/22/2021 - 1:39pm
natural language processing
unsupervised machine learning
unlabeled domain-specific documents corpora
text analysis
Task Analysis
specific-domain knowledge data sets
sensitive information
Sensitive Data Extraction
Scalability
Resiliency
pubcrawl
privacy preservation
physical documents
expert systems
Medical services
machine learning
knowledge transfer
Human behavior
digital documents
Data protection
data privacy
data obfuscation procedures
artificial intelligence training
artificial intelligence systems
Artificial Intelligence
privacy
biblio
Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things
Submitted by aekwall on Mon, 02/22/2021 - 1:36pm
iobt
storage resources
Scalability
resource-constrained nodes
Resiliency
pubcrawl
proof of common interest
NDN for IoBT
NDN
named data networking
named data network data-centric approach
IoBT setting
IoBT network
IoBT environment
Human Factors
Internet-of-Battlefield-Things
Internet of Things
internet
immutable trustworthy-distributed ledger feature
Human behavior
electronic data interchange
data privacy
data exchange
computer network security
blockchain technologies
Blockchain for IoBT
IoBT Security
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 1:25pm
network information preservation
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
Bayes methods
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
Compositionality
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
privacy
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
biblio
Privacy-Aware Quickest Change Detection
Submitted by grigby1 on Tue, 02/16/2021 - 1:25pm
GLRT statistic
quickest detection
Quickest change detection
QCD problem
properly designed sanitization channel
privacy-aware quickest change detection problem
privacy constraint
privacy considerations
optimization problem
Optimal Stopping Time
Maximal Leakage
Lorden's minimax formulation
information privacy requirements
privacy
GLR CuSum
generalized likelihood ratio CuSum
control charts
Data Sanitization
minimax techniques
Compositionality
data privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
Reliability
dynamic networks
software analysis
offline data analysis
live traffic monitoring
Google Home
Google devices
dynamic analysis security testing infrastructure
Amazon devices
security testing
Amazon Echo
dynamic analysis
Google
testing
security controls
Internet of Things
network traffic
composability
telecommunication traffic
data privacy
IoT devices
computer network security
Resiliency
resilience
Metrics
pubcrawl
IoT
Monitoring
data analysis
security
biblio
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Submitted by aekwall on Mon, 02/15/2021 - 4:50pm
surveillance videos
Proxy Reencryption
pubcrawl
public safety applications
public safety scenarios
realistic simulation environment
Resiliency
road safety
storage management
streaming
Proxy re-encryption
trusted control center
Unmanned Aerial Vehicles
Video communication
video recording
video streaming
video surveillance
video transmission
Videos
encryption
Cloud Computing
cloud storage
composability
Cryptography
cyber physical systems
data privacy
drones
efficient drone video sharing
efficient encryption
autonomous aerial vehicles
Intelligent Transportation Systems
law enforcement
Long Term Evolution
original encryption key
privacy
privacy concerns
privacy preserving
privacy-preserving Sharing
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 4:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
biblio
Research and Implementation on an Efficient Public Key Encryption Algorithm with Keyword Search Scheme
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
Public key
third-party server
third-party data
storage management
Servers
secret retrieval
searchable encryption algorithms
searchable encryption
Resiliency
query formulation
Public key Encryption with Keyword Search (PEKS)
public key encryption algorithm
public key encryption
public key cryptography
Cloud Computing
pubcrawl
NPEKS
network storage service
keyword search scheme
Keyword search
encryption
encrypted data
efficient encryption
data privacy
data confidentiality
cyber physical systems
corporate cloud storage environment
composability
biblio
Simulating the Effects of Social Presence on Trust, Privacy Concerns Usage Intentions in Automated Bots for Finance
Submitted by aekwall on Mon, 02/01/2021 - 11:41am
natural language interfaces
consumer trust
finance
financial advisory platforms
financial decisions
financial function
financial management
financial support purposes
financial technology
financially-sensitive information
human-to-human interaction
chatbot vignettes
perceived humanness
reliable chatbot
secure chatbot
social
Social presence
socio-emotional features
socio-emotional support
usage intentions
Vignette Emma
XRO23
chatbot
privacy concerns
Trusted Computing
Human behavior
pubcrawl
privacy
internet
Reliability
Industries
trust
Computers
data privacy
Decision support systems
Banking
User Perception
human trust
Investment
accessible banking
automated bots
automated decision technology
automated decisions
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »