Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy breach
biblio
TEE-based decentralized recommender systems: The raw data sharing redemption
Submitted by grigby1 on Fri, 03/17/2023 - 11:12am
recommender systems
Training
telecommunication traffic
Software
SGX
security
Scalability
Resiliency
resilience
Collaborative Work
pubcrawl
privacy breach
privacy
Neural networks
Human Factors
Human behavior
data privacy
biblio
Tolerating Untrustworthy Robots: Studying Human Vulnerability Experience within a Privacy Scenario for Trust in Robots
Submitted by grigby1 on Fri, 02/17/2023 - 8:44am
Interviews
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Robot sensing systems
Focusing
Robot Trust
Entertainment industry
Behavioral sciences
privacy breach
biblio
Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network
Submitted by aekwall on Mon, 01/18/2021 - 10:33am
neural nets
Fuzzy Cryptography
privacy preserving techniques
health sectors
fuzzy logic membership functions
autoencoder
privacy breach
stored data
hospitals
health care
Biological neural networks
Fuzzy logic
security
Autoencoder Neural Network
Metrics
privacy
pubcrawl
Resiliency
Organizations
electronic health records
data privacy
Cryptography
Scalability
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 10:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
biblio
A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and Deletion
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
Hybrid Blockchain
XOR Global State(XGS)
XOR global state
system trust
smart contracts
Servers
Scalability
Public key
pubcrawl
private key cryptography
privacy breach
privacy
owner private key
modification
metadata
hybrid blockchain-based XGS
append-only distributed ledger
Distributed databases
Distributed Database
deletion
database technology
data privacy
data deletion
create-retrieve-append-burn
CRAB method
contents modification
contents deletion
blockchain
block-chained hybrid blockchain system
authentication
arbitrary modifications
arbitrary injection