Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Automatic hair color de-identification
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
image recognition
video record
Skin
Segmentation
real-looking deidentified image
pubcrawl170113
privacy protection
privacy
primary biometric trait
multimedia content
image segmentation
automatic hair color deidentification method
image hair area segmentation
image colour analysis
Image color analysis
Hair Color
Hair
Facial features
Face
de-identification
data privacy
basic hair color recognition
biblio
Face de-identification using facial identity preserving features
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
facial images
surveillance
social networking (online)
pubcrawl170113
privacy-preserving social media
privacy protection
privacy
machine learning
learning (artificial intelligence)
k-anonymity facial image de-identification
k-anonymity
intra-identity variances
intelligent surveillance applications
image recognition
Active appearance model
facial image identity recognition
facial identity preserving features
face representation
face recognition
face de-identification
face blurring techniques
Face
deep learning-based facial identity-preserving features
deep learning
Databases
data privacy
automated human facial image de-identification
biblio
Controllable Face Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 2:12pm
identity alteration control
visual analytics
Training
t-closeness mechanism
subspace decomposition
Shape
pubcrawl170113
privacy-protection mechanisms
privacy
mutually orthogonal subspaces
L-diversity mechanism
k-anonymity mechanism
Image coding
Cameras
facial attributes
face recognition
face images
face encoding scheme
face de-identification
Face
Detectors
data privacy
controllable face privacy concept
computer vision analysis
computer vision
biblio
Affect-preserving privacy protection of video
Submitted by grigby1 on Wed, 03/08/2017 - 2:12pm
pubcrawl170113
wireless networks
Visual privacy protection
video signal processing
video applications
Three-dimensional displays
social sciences computing
social behaviors
Skin
Skeleton
shape deformation
Shape
security of data
security
affect-preserving privacy protection
privacy
mobile computing
mobile cameras
linear blend skinning
Image color analysis
health information
facial expression
face recognition
face image editing
Face
entertainment
data privacy
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
biblio
Literature review of different contention of E-commerce security and the purview of cyber law factors
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
Information systems
security privacy policy
security
pubcrawl170109
privacy
legislation
jurisdiction
IT
internet
information technology
Business
electronic commerce
e-consumer protection
E-Commerce Security
e-commerce law
data privacy
cyberspace security
cyber-crime activity
cyber law factor
Computer crime
biblio
A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
non-monetary incentives
Statistics
Sociology
social networking (online)
social network sites
public good
pubcrawl170108
pubcrawl170107
privacy implications
privacy
population estimate
personal information
nonmonetary incentives
data analysis
Non-cooperative game
Noise
Nash Equilibrium
incentive schemes
Games
game theory
game theoretic study
estimation
digital repositories
data privacy
Data Analytics
biblio
Privacy on hypothesis testing in smart grids
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
power system control
Yttrium
unauthorized binary hypothesis testing
testing
smart power grids
smart meters
smart meter
Smart Grids
pubcrawl170108
pubcrawl170107
privacy risk suppression
privacy information leakage
privacy
power system security
asymptotic exponential decay rate minimization
power control
optimal energy control strategy
optimal control
minimum type II error probability
error statistics
energy supply
energy storage device
Energy storage
energy source
energy provider
data privacy
consumer behaviour
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model
« first
‹ previous
…
94
95
96
97
98
99
100
101
102
…
next ›
last »