Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
BcIoT: Blockchain based DDos Prevention Architecture for IoT
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
Distributed databases
smart things
smart contract security
self-configuring things
IoT technologies
Internet of Thing (IoT)
hash based secret key
DDoS prevention
data consistency
centralized system
BcIoT
DDoS Attack Prevention
DDoS Attack
blockchain technology
contracts
Computer crime
blockchain
Metrics
composability
pubcrawl
Human behavior
Resiliency
computer architecture
data integrity
private key cryptography
Internet of Things
Conferences
data privacy
Data Security
computer network security
biblio
Research on Iris Edge Detection Technology based on Daugman Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 1:03pm
Hough algorithm
security
Scalability
Resiliency
pubcrawl
personal privacy
Metrics
Iris recognition
iris edge detection technology
Image edge detection
identity technology
Identity Security
biometrics (access control)
highly confidential privacy
frequency-domain analysis
Fingerprint recognition
face recognition
edge detection
daugman algorithm
data privacy
current society
convolution
composability
Calculus
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
biblio
Proxy Re-Encryption using MLBC (Modified Lattice Based Cryptography)
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
encrypted message
efficient encryption
secure proxy re-encryption
Re-encryption time
public key encryption
Proxy re-encryption
proxy key generation time
Modified Lattice Based Cryptography
MLBC
minimal trust proxy
maximum key privacy
Cryptography
efficient proxy re-encryption
cyber-physical systems
resilience
Resiliency
composability
pubcrawl
public key cryptography
data privacy
security
biblio
Preserving Privacy in Convolutional Neural Network: An ∊-tuple Differential Privacy Approach
Submitted by aekwall on Mon, 06/22/2020 - 11:20am
Deep Neural Network
ϵ-tuple differential privacy approach
Training data
significant accuracy degradation
salient data features
reusable output model
privacy preserving model
privacy concern
model inversion attack
model buildup data
financial data
deep neural networks
complex data features
medical data
CNN model
differential privacy
Cloud Computing
transfer learning
image recognition
convolutional neural network
convolutional neural nets
CNN
privacy
classification
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
data privacy
Scalability
biblio
Location Privacy Preservation and Location-based Service Quality Tradeoff Framework Based on Differential Privacy
Submitted by aekwall on Mon, 06/22/2020 - 11:20am
Scalability
data privacy
privacy concerns
Resiliency
Human behavior
pubcrawl
composability
differential privacy
location based services
application service providers
differential privacy framework
localization
location privacy preservation
location privacy preserving mechanism
Location-based service
location-based service quality tradeoff framework
biblio
Federated Learning with Bayesian Differential Privacy
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
image classification
sharper privacy loss
Servers
Scalability
Resiliency
pubcrawl
privacy budget
privacy accounting
privacy
machine learning
learning (artificial intelligence)
image classification tasks
Bayes methods
Human behavior
formal privacy guarantees
federated setting
federated learning
differential privacy
deep learning
data privacy
Computational modeling
composability
Bayesian privacy accounting method
Bayesian differential privacy
biblio
A Topology Based Differential Privacy Scheme for Average Path Length Query
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Erbium
topology based differential privacy scheme
query function
privacy control parameters
node privacy protection
network vertices
edge-weighted privacy protection
differential privacy security mechanism
data query
average path length query
APL query
network topology
Euclidean distance
Scalability
Perturbation methods
Sensitivity
privacy protection
differential privacy
query processing
data availability
privacy
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
A Differential Privacy Random Forest Method of Privacy Protection in Cloud
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Decision trees
random forest classification algorithm
random forest algorithm
hybrid decision tree algorithm
high privacy protection
high classification performance
differential privacy random forest method
differential privacy protection
Forestry
classification accuracy
privacy protection
differential privacy
Cloud Computing
Prediction algorithms
pattern classification
privacy
composability
pubcrawl
Human behavior
Resiliency
Random Forest
Classification algorithms
data privacy
Scalability
biblio
Dynamic Data Publishing with Differential Privacy via Reinforcement Learning
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
differential privacy
privacy guarantee
privacy budget allocation scheme
privacy budget allocation phase
privacy budget
dynamic data publishing strategy
dynamic data publishing algorithm
dynamic data
data release
data publishing
Publishing
privacy protection
Scalability
Heuristic algorithms
resource allocation
Reinforcement learning
resource management
privacy
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
data privacy
« first
‹ previous
…
52
53
54
55
56
57
58
59
60
…
next ›
last »