Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
anonymity
biblio
A service-oriented adaptive anonymity algorithm
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
quasiidentifier attributes
Metrics
Partitioning algorithms
privacy
privacy preservation
privacy-preserving data publishing
pubcrawl
Publishing
Quasi-identifier Attributes
K-anonymity algorithms
released data
resilience
Resiliency
sensitive attributes
service-oriented adaptive anonymity algorithm
service-oriented architecture
splitting value
Adaptation models
k-anonymity
Internet of Things
Human behavior
distribution characteristics
dispersion
data privacy
data handling
contribution value differences
composability
attribute values distribution
attribute value distribution
anonymous results
anonymized data
anonymity group partition process
anonymity
biblio
Differential Privacy Algorithm Based on Personalized Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 1:58pm
pattern classification
tuple personality factor classification value
security of data
Resiliency
resilience
quasiidentifier attribute
Publishing
pubcrawl
privacy protection relevance
privacy
personalized k-anonymity model
personalized anonymity
anonymity
Metrics
Human behavior
existing anonymized differential privacy
differential privacy data publishing algorithm
differential privacy
Data protection
Data models
composability
Clustering algorithms
Classification algorithms
biblio
KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale
Submitted by aekwall on Mon, 10/12/2020 - 11:32am
approximate counting techniques
Expert Systems and Privacy
very large databases
reidentifiability
publicly available data sets
pseudonymous identified data sets
proprietary data sets
privacy relevant characteristics
KHyperLogLog
KHLL
joinability risks
joinability analysis
Data-Privacy
data characteristics
Approximate-Counting
Scalability
Data Governance
Approximation algorithms
Human Factors
Indexes
anonymity
Measurement
regression analysis
privacy
pubcrawl
Human behavior
Runtime
Organizations
data privacy
biblio
A Semantic k-Anonymity Privacy Protection Method for Publishing Sparse Location Data
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
semantic k-anonymity privacy protection method
privacy disclosure
privacy leaks
privacy protection
pubcrawl
Publishing
resilience
Resiliency
semantic attacks
nonsensitive data
semantic privacy protection
semantic translation
Semantics
sensors
sparse location data
Trajectory
user sensitive information
k-anonymity
anonymous set
attacker
composability
compressed sensing
data privacy
diversity reception
Human behavior
information science
anonymity
location based services
location information
location technology
location-based services
Metrics
missing location data
multiuser compressing sensing method
biblio
Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
privacy problem
epsilon-differential privacy mechanism
evaluation
expected risks
Human behavior
k-anonymity algorithm
Metrics
privacy
privacy environment
dilemmas
privacy protection algorithms
pubcrawl
resilience
Resiliency
Runtime
security of data
unexpected risks
Data models
algorithm orientations
analytical evaluation
anonymity
anonymity algorithm
Cloud Computing
cloud computing environment
composability
data analysis
algorithm orientation
data privacy
Data Security
data segregation
Databases
differential privacy
differential privacy algorithm
differential privacy mechanism
biblio
Cascading Machine Learning to Attack Bitcoin Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
decentralized cryptocurrency
Resiliency
resilience
pubcrawl
pattern classification
multiclass classification performance
Metrics
learning (artificial intelligence)
Human behavior
graph model
entities classification
electronic money
digital assets
anonymity
data privacy
Cryptography
composability
cascading machine
cascading classifiers
blockchain
Bitcoin network
bitcoin entity characterization
bitcoin blockchain data
bitcoin anonymity
Bitcoin analysis
biblio
An Approach for Distributing Sensitive Values in k-Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
microdata table
simple distribution of sensitive values
simple distribution
sensitive attributes
SDSV
Resiliency
resilience
quasiidentifier group
pubcrawl
privacy guarantee
anonymity
Metrics
low sensitive values
k-anonymity
Human behavior
high-sensitive values
high-sensitive value
Entropy
data privacy
composability
biblio
Algorithm for k-anonymity based on ball-tree and projection area density partition
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Loss measurement
usability
UCI
trees (mathematics)
tree data structures
Resiliency
resilience
pubcrawl
projection area density partition
privacy
Partitioning algorithms
microdata publishing
Metrics
Adult dataset
kd-tree
k-anonymity algorithm
k-anonymity
information science
individual privacy protection
Human behavior
Gotrack dataset
data privacy
composability
Classification algorithms
ball-tree
anonymity
biblio
Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Multiplexing
transport protocols
transport design
Tor transport layer
Tor anonymity network
Tor
QUIC protocol
QUIC
Performance
onion routers
head-of-line blocking problem
handshaking delays
Google protocol
empirical performance evaluation
Anonymity Network
sockets
security
Relays
anonymity
Metrics
public domain software
Kernel
delays
composability
Protocols
internet
data privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Anonymity Mixes as (Partial) Assembly Queues: Modeling and Analysis
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
anonymity mixes
traffic disruption techniques
randomized batch mixing strategy
queueing model
particular anonymize
Order statistics.
delay properties
delay analysis
communicating users
Chaum mixes
batch mix
anonymity platforms route
pubcrawl
anonymity metrics
queueing theory
anonymity
Metrics
telecommunication traffic
telecommunication network routing
composability
telecommunication security
Resiliency
resilience
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »