Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
location information
biblio
A graph anonymity-based privacy protection scheme for smart city scenarios
Submitted by grigby1 on Fri, 05/12/2023 - 10:21am
resilience
location information
Graph Anonymity
location privacy
location awareness
graphical models
Control Theory
Resiliency
Personnel
pubcrawl
Fingerprint recognition
smart cities
real-time systems
privacy
Scalability
Human Factors
Human behavior
biblio
Research on Location Information and Privacy Protection Based on Big Data
Submitted by grigby1 on Fri, 05/12/2023 - 10:20am
location information
The fuzzy theory
supply chains
Scalability
Resiliency
resilience
pubcrawl
privacy protection
privacy
network security
Forward Error Encryption
Information services
information networks
Human Factors
Human behavior
Heuristic algorithms
data privacy
Control Theory
Big Data
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
biblio
A Semantic k-Anonymity Privacy Protection Method for Publishing Sparse Location Data
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
semantic k-anonymity privacy protection method
privacy disclosure
privacy leaks
privacy protection
pubcrawl
Publishing
resilience
Resiliency
semantic attacks
nonsensitive data
semantic privacy protection
semantic translation
Semantics
sensors
sparse location data
Trajectory
user sensitive information
k-anonymity
anonymous set
attacker
composability
compressed sensing
data privacy
diversity reception
Human behavior
information science
anonymity
location based services
location information
location technology
location-based services
Metrics
missing location data
multiuser compressing sensing method
biblio
Cloud: privacy For Locations Based-services' through Access Control with dynamic multi-level policy
Submitted by aekwall on Mon, 01/20/2020 - 12:14pm
location-based services
zero trust
user privacy in the cloud
user location data
third-party application
supplementary servers
Scalability
Resiliency
pubcrawl
policy-based governance
mobile computing
Metrics
Access Control
location information
LBSs
Human Factors
dynamic multilevel policy
data privacy protection
data privacy
data partitioning
cloud-based locations
cloud service
Cloud Computing
authorisation
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
A Control-Theoretic Approach for Location Privacy in Mobile Applications
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
location privacy
users mobility pattern
Scalability
Resiliency
resilience
pubcrawl
protection algorithm
privacy issues
privacy
POI-related privacy measure
PI control strategy
PI control
mobility records simulation
mobile computing
Mobile Applications
Meters
Computing Theory and Privacy
location information
literature focus
Human behavior
dynamic modeling
dispersion
data privacy
Data models
cyber physical systems
Cyber Physical System
control-theoretic approach
control-based approach
Control Theory
control signals
control formulation
biblio
On Protecting Location Secrecy
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
LSM
wireless localization network
Wireless communication
telecommunication security
Scalability
Resiliency
resilience
pubcrawl
privacy
Position measurement
Particle measurements
mobility management (mobile radio)
Metrics
Adversary Models
location secrecy metric
Location secrecy
location information
localization process
localization
Human behavior
general measurement model
eavesdropper
Communication system security
channel conditions
Atmospheric measurements
Algorithm design and analysis
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
1
2
next ›
last »