Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
resilience
neural nets
privacy
privacy issues
privacy-preserving deep learning
privacy-preserving financial data analytics systems
privacy-preserving logistic regression
pubcrawl
regression analysis
JST CREST AI
Resiliency
Scalability
social challenges
social life
social sciences computing
Society 5.0
super-smart society
additively homomorphic encryption
IoT
information and communication technology
Human Factors
Human behavior
fraud
fourth industrial revolution
financial institutions
financial data processing
encryption
digital arithmetic
deep learning
data privacy
data analysis
Big Data
AI
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
Electrocardiography
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
ethereum
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
resilience
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
Logic gates
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
biblio
Protecting Multimedia Privacy from Both Humans and AI
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
image
AI
protecting multimedia privacy
private information
multimedia privacy issues
multimedia data
multimedia
image privacy
human adversaries
AI-assisted malicious entities
AI-assisted attackers
adversarial image perturbation
Image coding
privacy
Scalability
face recognition
privacy protection
deep learning
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Artificial Intelligence
security of data
biblio
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms
Submitted by grigby1 on Fri, 08/07/2020 - 3:37pm
permissioned blockchain
Markov
Markov model
Markov processes
mathematical analysis
Mathematical model
Media
Metrics
outline justification
malware
permissioned blockchain platforms
private key leakage
Private Key Storage
pubcrawl
resilience
Resiliency
Scalability
security
composability
Air Gapped Wallet
air gapped wallet schemes
Air gaps
Atmospheric modeling
attack surface
blockchain
blockchain security
Channel Exfiltration
Air Gapped Storage
cryptocurrencies
data privacy
Distributed databases
Electromagnetics
Human behavior
Human Factors
key extraction
biblio
A Vehicle Trajectory Adversary Model Based on VLPR Data
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
traffic engineering computing
qualified identifier attributes
Resiliency
road average speed
road traffic
road vehicles
Roads
Scalability
target trajectory
pubcrawl
Trajectory
trajectory linking
vehicle information
vehicle license plate recognition data
vehicle suspicion list
vehicle trajectory adversary model
VLPR system
image recognition
Adversary Modeling
Adversary Models
closest time method
Data models
data privacy
desensitized VLPR data
Foshan City VLPR data
Human behavior
adversary model
ITS
Licenses
Metrics
privacy
privacy attacking method
privacy disclosure
privacy protection
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
biblio
Identity-Based Aggregate Signature Scheme in Vehicle Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
message authentication
vehicular ad hoc networks
vehicle network
vehicle identity
vehicle anonymity
vehicle ad-hoc network
VANET
telecommunication security
Resiliency
privacy preserving
privacy
Metrics
message signatures
pubcrawl
identity-based aggregate signature scheme
digital signatures
data privacy
Cryptography
Compositionality
Cloud Computing
authorisation
authentication
Aggregates
aggregate signature algorithm
Aggregate Signature
Ad Hoc Network Security
biblio
Robust and Responsive Acoustic Pairing of Devices Using Decorrelating Time-Frequency Modelling
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
Acoustic Fingerprinting
Acoustic Fingerprints
voice-related information
voice user interfaces
Voice User Interface
unified voice user interface
time-frequency representation
natural interaction
decorrelation
decorrelating time-frequency modelling
DCT
audio quality
audio fingerprint
acoustic pairing
authorisation
access management rules
Acoustic signal processing
Time-frequency Analysis
acoustic signal
audio signal processing
user interfaces
user privacy
Robustness
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Privacy Mining of Large-scale Mobile Usage Data
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
machine learning tools
android
mobile devices
ios
iOS (operating system)
mobile network
privacy leakage detection
iOS Security
iOS system
inference mechanisms
mobile privacy leakage
mobile traffic data
mobile usage data
privacy analysis
privacy detection model
privacy inference mining
privacy mining
private usage patterns
data privacy
security of data
data analysis
Data mining
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
learning (artificial intelligence)
privacy
Object recognition
mobile computing
smart phones
Metrics
Compositionality
password
biblio
iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS Devices
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
Mobile Security
APP-related information
iMonitor
iOS (operating system)
iOS 9+
iOS devices
labeling system
Mobile app
mobile network
mobile network traffic
APP-level traffic monitoring
mobile traffic monitoring
network monitor
NetworkExtension framework
privacy leakage detection
traffic classification methods
traffic label
User profiling
user-related information
iOS Security
smart phones
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
privacy
mobile computing
Monitoring
sensors
Metrics
Virtual private networks
Compositionality
traffic engineering computing
ios
.pcap files
APP labels
« first
‹ previous
…
47
48
49
50
51
52
53
54
55
…
next ›
last »