Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
IoT Trajectory Data Privacy Protection Based on Enhanced Mix-zone
Submitted by aekwall on Mon, 09/21/2020 - 3:50pm
privacy protection
Control Theory and Privacy
weighted undirected graph
user flow-based algorithm
traditional Mix-zone
Mix-zone
migration probability
IoT trajectory data privacy protection
enhanced Mix-zone
attack method
data sets
cyber physical systems
computer network security
cyber-physical systems
probability
privacy
graph theory
pubcrawl
Human behavior
Resiliency
information security
Internet of Things
data privacy
Scalability
biblio
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain
Submitted by aekwall on Mon, 09/21/2020 - 3:50pm
market value
cars
adversarial modifications
Decentralized Metering
DeMetrA - decentralized metering
Distributed Database
DSLRs
identity-based cryptography
identity-based signatures
layered encoding
cyber physical systems
odometer fraud
odometers
practical concern
product attributes
pseudonym
reported values
shutter counters
specific counters
Control Theory and Privacy
privacy
Scalability
Cryptography
data privacy
History
Protocols
malicious modification
Resiliency
Human behavior
pubcrawl
automobiles
blockchain
Distributed databases
cyber-physical systems
digital signatures
Public key
blockchain technology
user anonymity
Europe
biblio
Data Collection from Privacy-Aware Users in the Presence of Social Learning
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
data collector
Control Theory and Privacy
symmetric randomized response strategy
state estimation accuracy
social learning
Social groups
private signal
privacy-preserving data
privacy-aware users
privacy cost
payment mechanism
noisy group signals
informative non-disclosive strategy
generalized majority voting rule
friends
elicited data
Scalability
Bayesian-Nash equilibrium
cyber physical systems
Silicon
Noise measurement
Data collection
cyber-physical systems
privacy
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Data models
Bayes methods
game theory
data privacy
biblio
Universal Privacy Guarantees for Smart Meters
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
customer privacy
Silicon
battery management systems
Stochastic processes
power distribution
cyber physical systems
maximal information leakage
stochastic models
battery charging policy
adaptive codes
electricity distribution system efficiency
home batteries
nonprobabilistic permuting channels
random processes
universal privacy guarantees
user energy consumption
Control Theory and Privacy
Scalability
utility provider
energy cost
smart meters
energy consumption
energy management systems
power engineering computing
cyber-physical systems
Measurement
Mutual information
privacy
batteries
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Bidirectional Information Flow and the Roles of Privacy Masks in Cloud-Based Control
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
Gaussian noise
Control Theory and Privacy
uplink privacy masks
privacy loss
noise levels
linear plant
Gaussian process noise
downlink privacy masks
cloud-based control architecture
cloud-based control
bidirectional information flow
Cloud Computing
privacy-utility trade-off
cyber physical systems
cyber-physical systems
Mutual information
privacy
pubcrawl
Human behavior
Resiliency
data privacy
Scalability
biblio
Symmetries and privacy in control over the cloud: uncertainty sets and side knowledge*
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
cloud
Control Theory and Privacy
uncertainty sets
transformation-based method
side knowledge
control algorithms
Cost function
Transforms
cyber physical systems
set theory
Trajectory
Cloud Computing
privacy protection
control engineering computing
cyber-physical systems
privacy
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Scalability
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
pubcrawl
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
indoor localization
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
differential privacy guarantee
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
Computing Theory
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior
biblio
A Access Control Model of Associated Data Sets Based on Game Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:48pm
cyber-physical systems
Control Theory and Privacy
sensitive information owner
sensitive information divulgence
privacy protection issue
privace protection
Nash equilbrium
Internet applications
associated data sets protection model
associated data sets
access control model
cyber physical systems
Games
Scalability
Analytical models
internet
privacy
pubcrawl
Human behavior
Resiliency
Data models
game theory
data privacy
Access Control
authorisation
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 3:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Decentralized Data Marketplace to Enable Trusted Machine Economy
Submitted by aekwall on Mon, 09/21/2020 - 3:40pm
streaming data
data marketplaces
decentralization
decentralized architecture
decentralized data marketplace
encrypted message channel
Evolutionary Game Theory
matching process
refunding processes
strategic decision-making
Data marketplace
trade records
trading policies
trading process
trusted data streams
trusted machine economy
trustless architecture
verifiable Auth-compliant request
Computer Theory and Trust
data providers
data privacy
data integrity
distributed processing
game theory
computer network management
pubcrawl
composability
Decision Making
Cryptography
Compositionality
transaction processing
financial data processing
distributed ledgers
transaction process
IoT data
contract-oriented interactions
customer experiences
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
…
next ›
last »