Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
perturbation
biblio
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic
Submitted by aekwall on Tue, 12/20/2022 - 4:21pm
Perturbation methods
white-box
White Box Security
transferability
Spiking Neural Networks
SNNs
security
Resiliency
pubcrawl
Probabilistic logic
adversarial attacks
perturbation
Neural networks
Metrics
Medical diagnosis
Linear programming
Degradation
composability
black-box
biblio
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 9:46am
machine learning
sensors
security
SCADA systems
pubcrawl
privacy preservation
privacy
perturbation
Monitoring
authentication
Human Factors
data privacy
cyber-physical systems
cyberattack
Cryptography
CPS Privacy
blockchain
biblio
Proposing Innovative Perturbation Algorithm for Securing Portable Data on Cloud Servers
Submitted by grigby1 on Thu, 07/08/2021 - 1:38pm
Program processors
user privacy in the cloud
user privacy
tools
Technological innovation
Servers
security
Scalability
Resiliency
resilience
pubcrawl
cloud
privacy
Perturbation methods
perturbation
Noise addition
Metrics
encryption
decryption
data privacy
Cloud Computing
biblio
Sparser: Secure Nearest Neighbor Search with Space-filling Curves
Submitted by aekwall on Mon, 02/22/2021 - 12:45pm
nearest neighbor search
strengthening privacy
Sparser pre-processes plaintext data
space-filling perturbation
Space-filling curve
secure nearest neighbor search
perturbation
nearest neighbor queries
logarithmic time
approximate nearest neighbors
approximate nearest neighbor search solution
order-preserving encryption
Cryptography
space-filling curves
approximation theory
Predictive Metrics
Curve fitting
Measurement
query processing
pubcrawl
nearest neighbour methods
data privacy
encrypted data
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
TMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use
Submitted by grigby1 on Thu, 01/31/2019 - 11:19am
perturbation
TMk-anonymity
Resiliency
resilience
pubcrawl
privacy preservation
privacy
Pk-anonymity
Perturbation methods
anonymity
Metrics
k-anonymity
Human Factors
Human behavior
Global Positioning System
gaussian distribution
composability
anonymization
biblio
L-GEM based robust learning against poisoning attack
Submitted by grigby1 on Fri, 07/06/2018 - 1:05pm
Robustness
poisoning attack
pubcrawl
radial basis function networks
RBFNN
resampling
resilience
Resiliency
robust learning
perturbation techniques
sampling methods
Scalability
Sensitivity
sensitivity analysis
Support vector machines
Training
wavelet analysis
Accuracy
perturbation
Pattern recognition
nearest-first flips attack
Localized Generalization Error Model (L-GEM)
localized generalization error model
localized generalization error bound
learning process
learning (artificial intelligence)
label flip poisoning attacks
L-GEM based robust learning
Human behavior
farthest-first flips attack
classifier output
AI Poisoning
adversarial learning