Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversaries
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
Security modalities on linear network code for randomized sources
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
randomized sources
network coding
number random symbols
optimally secure information transmission
Peer-to-peer computing
pubcrawl
r-secure
random keys
random source symbols
randomized source messages
Metrics
resilience
Resiliency
Secure network code
security
security constraints
security modalities
telecommunication security
weakly secure
wiretapped network
information symbols
composability
computational security
Conferences
cryptographic measure
Cryptography
encoding
illegitimate users
imperfectly secure
information rate
adversaries
information theoretic approach
information theoretic security bounds
Knowledge engineering
linear codes
linear network code
linear network coding scheme
Mathematical model
maximized information transmission