Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Enhanced p-Sensitive k-Anonymity Models for Achieving Better Privacy
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
Metrics
skew attacks
sensitive groups
sensitive attacks
Resists
Resiliency
resilience
Publishing
pubcrawl
Privacy Requirements
privacy
personalized protection characteristic
personalized privacy protection
Partitioning algorithms
one size fits all unified privacy protection level
anonymity
Human behavior
homogeneous attacks
faces
enhanced p-sensitive k-anonymity models
enhanced anonymous models
data utility
data publishing
data privacy
Data models
data anonymity
composability
Clustering algorithms
clustering
biblio
A service-oriented adaptive anonymity algorithm
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
quasiidentifier attributes
Metrics
Partitioning algorithms
privacy
privacy preservation
privacy-preserving data publishing
pubcrawl
Publishing
Quasi-identifier Attributes
K-anonymity algorithms
released data
resilience
Resiliency
sensitive attributes
service-oriented adaptive anonymity algorithm
service-oriented architecture
splitting value
Adaptation models
k-anonymity
Internet of Things
Human behavior
distribution characteristics
dispersion
data privacy
data handling
contribution value differences
composability
attribute values distribution
attribute value distribution
anonymous results
anonymized data
anonymity group partition process
anonymity
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
Resiliency
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Metrics
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
Data protection
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
android encryption
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
biblio
Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
modern mobile devices
video sharing software
times people
Software
smart phones
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving mobile video sharing
privacy-preserving method
android encryption
mobile computing
mobile cameras
Metrics
Human behavior
fully homomorphic encryption scheme
encryption
data privacy
Cryptography
Conferences
Cameras
biblio
A Hybrid Secure Keyword Search Scheme in Encrypted Graph for Social Media Database
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
query processing
graph
graph encryption
graph generation
graph theory
hybrid secure keyword search scheme
kNK keyword search algorithm
nearest neighbour methods
privacy preservation
encryption
Resiliency
search operation
search process
shortest path algorithm
social media database
social networking (online)
top k nearest keyword search algorithm
nearest neighbor search
encrypted graph
distributed environment
data privacy
Cryptography
confidentiality
computer network security
composability
cloud environment
Cloud Computing
attack graphs
advanced encryption standard algorithm
active attacks
Predictive Metrics
Measurement
pubcrawl
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
gradient information
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient methods
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
Robustness
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
security of data
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 11:35am
fuzzy set theory
Fuzzy Cryptography
symmetric cryptographic algorithms
suitable cryptographic algorithm
SHA256
fuzzy analytic hierarchy process
FAHP
experts grading method
ECDSA
asymmetric cryptographic algorithms
financial data processing
AES
cryptographic algorithms
security
cryptocurrencies
analytic hierarchy process
Distributed databases
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Hardware
data privacy
Computational efficiency
Scalability
biblio
Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network
Submitted by aekwall on Mon, 01/18/2021 - 11:33am
neural nets
Fuzzy Cryptography
privacy preserving techniques
health sectors
fuzzy logic membership functions
autoencoder
privacy breach
stored data
hospitals
health care
Biological neural networks
Fuzzy logic
security
Autoencoder Neural Network
Metrics
privacy
pubcrawl
Resiliency
Organizations
electronic health records
data privacy
Cryptography
Scalability
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »