Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
accountability
biblio
Label-Only Model Inversion Attacks via Boundary Repulsion
Submitted by aekwall on Fri, 03/31/2023 - 9:35am
Semantics
privacy and ethics in vision
fairness
ethics
Adversarial attack and defense
accountability
transparency
Training data
Black Box Attacks
Neural networks
composability
Resiliency
Metrics
pubcrawl
face recognition
Predictive models
computer architecture
biblio
Privacy and security challenges for autonomous agents : A study of two social humanoid service robots
Submitted by grigby1 on Fri, 02/17/2023 - 5:27pm
accountability
Social Agents
DLT
autonomous agents
Agent
social robots
humanoid robot
autonomy
Robot sensing systems
privacy
Protocols
Scalability
security
Human behavior
pubcrawl
machine learning
Cloud Computing
biblio
Mixed Differential Privacy in Computer Vision
Submitted by grigby1 on Fri, 01/06/2023 - 4:10pm
transparency
retrieval
Recognition: Detection
Privacy and federated learning
privacy and ethics in vision
fairness
categorization
Human Factors
computer vision
AI
differential privacy
Training
Upper bound
visualization
accountability
Computational modeling
privacy
Scalability
Resiliency
resilience
pubcrawl
biblio
Verifying Accountability for Unbounded Sets of Participants
Submitted by grigby1 on Wed, 08/03/2022 - 4:12pm
pubcrawl
Protocols
verification
composability
computer security
accountability
trustworthiness
formal-methods
electronic voting
Security-Protocols
biblio
Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems
Submitted by aekwall on Tue, 03/01/2022 - 4:32pm
accountability
anonymity
composability
computer architecture
copyright protection
Digital rights management
Industries
Informatics
Metrics
network accountability
privacy
pubcrawl
Resiliency
telecommunication computing
biblio
Accountable and privacy-aware flexible car sharing and rental services
Submitted by aekwall on Tue, 03/01/2022 - 4:31pm
Access Control
accountability
authentication
authorization
automobiles
composability
Metrics
network accountability
privacy
Protocols
pubcrawl
Resiliency
security
smart cities
Transportation
V2X
biblio
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks
Submitted by aekwall on Tue, 03/01/2022 - 4:30pm
Metrics
Web and internet services
smart contracts
smart contract
Resiliency
pubcrawl
network architecture
network accountability
named data networking
Access Control
internet
handwriting recognition
data encryption
composability
blockchain
authentication
accountability
biblio
A Secure Mobile Payment Protocol for Handling Accountability with Formal Verification
Submitted by grigby1 on Thu, 02/24/2022 - 12:30pm
information security
Transaction Security
tools
security
Scyther tool
pubcrawl
Protocols
protocol verification
privacy
policy-based collaboration
Payment Protocol
Online banking
Mobile payment systems
Metrics
Industries
Cryptography
Compositionality
composability
collaboration
AVISPA tool
authorization
authentication
accountability
network accountability
Resiliency
biblio
An Anonymous Editable Blockchain Scheme Based on Certificateless Aggregate Signature
Submitted by grigby1 on Tue, 12/21/2021 - 10:18am
accountability
Aggregates
Analytical models
anonymity
anonymous messaging
blockchains
certificateless aggregate signature
editable blockchain
Law
natural language processing
pubcrawl
Registers
resilience
Resiliency
Scalability
smart contracts
biblio
Accountability in the Decentralised-Adversary Setting
Submitted by aekwall on Mon, 12/20/2021 - 12:30pm
Cryptography
Task Analysis
Protocols
tools
Analytical models
Access Control
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
accountability
consumer behavior
verification
Adversary Models
1
2
3
4
next ›
last »