Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security and privacy
biblio
A Quantitative Metric for Privacy Leakage in Federated Learning
Submitted by aekwall on Mon, 01/31/2022 - 3:31pm
Security Risk Estimation
Collaborative Work
Data models
estimation
federated learning
information theory
Measurement
pubcrawl
Resiliency
Scalability
security
security and privacy
security metric
Signal processing algorithms
Training
work factor metrics
biblio
Security Issues and Challenges in RFID, Wireless Sensor Network and Optical Communication Networks and Solutions
Submitted by grigby1 on Mon, 11/08/2021 - 12:32pm
radiofrequency identification
attacks
Communication networks
composability
Human behavior
Metrics
network security
optical network
Production
Protocols
pubcrawl
WSN
Reliability
resilience
Resiliency
RFID security
security
security and privacy
security goals
sensor networks
sensor security
wireless sensor networks
biblio
A Practical Defense against Attribute Inference Attacks in Session-based Recommendations
Submitted by aekwall on Tue, 08/31/2021 - 10:50am
Human Factors
privacy
data privacy
real-time systems
Scalability
Inference algorithms
Conferences
pubcrawl
Resiliency
recommender systems
Attribute Inference
Machine learning as privacy attacks
Mobile Applications
Privacy Protections
security and privacy
web services
biblio
A Comparison of Blockchain-Based Wireless Sensor Network Protocols
Submitted by grigby1 on Tue, 08/17/2021 - 3:33pm
pubcrawl
wireless sensor networks
wireless networks
Throughput
sensors
security and privacy
Scalability
Resiliency
resilience
bitcoin
Peer-to-peer computing
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
Consensus algorithm
Compositionality
blockchain
biblio
LABVS: Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV)
Submitted by grigby1 on Wed, 06/30/2021 - 2:55pm
Metrics
Vehicle-to-grid
vehicle dynamics
security and privacy
Resiliency
resilience
Public key
pubcrawl
privacy
authentication
Internet of Vehicles (UIoV)
Internet of Vehicles
Human Factors
Human behavior
Hash functions
cyber physical systems
Batch verification
biblio
An Efficient Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV)
Submitted by grigby1 on Wed, 06/30/2021 - 2:55pm
pubcrawl
vehicular ad hoc networks
Universal Internet of Vehicles (UIoV)
Task Analysis
security and privacy
Resiliency
resilience
Reliability
Public key
authentication
privacy
Metrics
Internet of Vehicles
Human Factors
Human behavior
cyber physical systems
Batch verification
biblio
Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device
Submitted by aekwall on Mon, 10/26/2020 - 10:45am
data tampering
Linux Operating System Security
Universal Serial Bus
software portability
security and privacy
portability
permanent record deletion
operating systems
operating system security flaws
live Linux distribution device
Live Devices
live device attacks
Linux operating system
security of data
Insider Threats
Predictive Metrics
File systems
microsoft windows
data theft
Metrics
composability
pubcrawl
Resiliency
Linux
mobile computing
security
biblio
Enhancing Big Data Security using Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 06/26/2020 - 11:55am
map reduce Hadoop
Servers
security of data
security and privacy
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
Big Data
Indium tin oxide
Elliptic curve cryptography
data processing technology
data distribution
data configuration
data analysis
big data security
big data analytics.
biblio
Game-Theoretic Planning to Counter DDoS in NEMESIS
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
Human Factors
security and privacy
packet-level simulation
network maneuvers
NEMESIS
game-theoretic planning
game theoretic optimal courses of action
distributed denial-of-service attacks
COA
analytical wargaming
game theoretic security
Predictive Metrics
Computer crime
Games
Mathematical model
Planning
Analytical models
pubcrawl
game theory
Servers
Scalability
distributed denial of service attacks
DDoS
computer network security
biblio
Membership Inference Attacks Against Adversarially Robust Deep Learning Models
Submitted by grigby1 on Fri, 04/03/2020 - 11:56am
provable security
resilience
Training data
target model
security and privacy
provable defense
privacy challenges
membership inference attack
evasion attacks
empirical membership inference attacks
adversarially robust deep learning models
adversarial training method
adversarial defenses
adversarial defense methods
adversarial defense
deep learning
Compositionality
Metrics
neural nets
security challenges
privacy
Data models
data privacy
Resiliency
pubcrawl
security
Predictive models
Training
security of data
learning (artificial intelligence)
« first
‹ previous
1
2
3
4
5
next ›
last »