Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Privacy Protections
biblio
A Practical Defense against Attribute Inference Attacks in Session-based Recommendations
Submitted by aekwall on Tue, 08/31/2021 - 10:50am
Human Factors
privacy
data privacy
real-time systems
Scalability
Inference algorithms
Conferences
pubcrawl
Resiliency
recommender systems
Attribute Inference
Machine learning as privacy attacks
Mobile Applications
Privacy Protections
security and privacy
web services
biblio
A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
security architecture
Location Privacy in Wireless Networks
source location protection
Smart IoT
protecting source-location privacy scheme
Privacy Protections
multi-sinks
critical problems
CPSLP scheme
attack modes
source location privacy
cloud-based
Position measurement
daily activities
Transforms
Compositionality
Cloud Computing
probability
telecommunication network routing
Metrics
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
security
telecommunication security
data privacy
biblio
Test-Driven Anonymization for Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
anonymization efforts
artificial intelligence security
test-driven anonymization approach
Software Testing
regulatory requirements
Privacy Protections
nonfunctional quality
k-anonymity
internal requirements
Insurance
functional suitability
functional quality
classification AIs
artificial intelligence tools
anonymized data
anonymization techniques
tools
anonymization
AI context
artificial intelligence technique
testing
Data protection
pattern classification
Production
health care
data privacy
Data models
pubcrawl
Artificial Intelligence
Predictive models
security of data
biblio
A Data Hiding Approach for Sensitive Smartphone Data
Submitted by grigby1 on Tue, 09/05/2017 - 12:50pm
composability
digital signal processing
Metrics
Mobile and Wireless Security
privacy
Privacy Protections
pubcrawl
Resiliency
signal processing security
Smartphones
ubiquitous computing
biblio
A Data Hiding Approach for Sensitive Smartphone Data
Submitted by grigby1 on Tue, 08/22/2017 - 10:54am
digital signal processing
Human behavior
Mobile and Wireless Security
pervasive computing
Privacy Protections
pubcrawl
Resiliency
Scalability
Smartphones
ubiquitous computing
file
Rumor Source Obfuscation on Irregular Trees
Submitted by awhitesell on Wed, 07/13/2016 - 12:49pm
Science of Security
anonymity
anonymous messaging
Anonymous Social Media
Measurement
NSA SoS Lablets Materials
privacy anonymity
privacy models
privacy models and measurement
Privacy Protections
pubcrawl
Resiliency
Rumer Spreading
Scalability
Science of Security
UIUC
work factor metrics
Privacy Protections
UIUC
NSA SoS Lablets Materials
Anonymous Messaging
biblio
Rumor Source Obfuscation on Irregular Trees
Submitted by awhitesell on Wed, 07/13/2016 - 12:48pm
Science of Security
anonymity
anonymous messaging
Anonymous Social Media
Measurement
NSA SoS Lablets Materials
privacy anonymity
privacy models
privacy models and measurement
Privacy Protections
pubcrawl
Resiliency
Rumer Spreading
Scalability
Science of Security
UIUC
Privacy Protections
UIUC
NSA SoS Lablets Materials
biblio
Insecure Behaviors on Mobile Devices Under Stress
Submitted by enck on Wed, 09/17/2014 - 5:32pm
Science of Security
Foundations
ACM CCS
foundations
Human and Societal Aspects of Security and Privacy
information privacy
Mobile and Wireless Security
network security
Privacy Protections
Science of Security
ACM CCS
Information Privacy
Privacy Protections
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
Network Security
biblio
Phishing in International Waters: Exploring Cross-national Differences in Phishing Conceptualizations Between Chinese, Indian and American Samples
Submitted by emerson on Wed, 09/17/2014 - 5:30pm
Science of Security
Foundations
ACM CCS
China
cultural differences
foundations
Human and Societal Aspects of Security and Privacy
India
information privacy
Intrusion/Anomaly Detection and Malware Mitigation
nationality
online privacy
Phishing
Privacy Protections
Science of Security
Social Aspects of Security and Privacy
Social Engineering Attacks
susceptibility
ACM CCS
Information Privacy
Phishing
Privacy Protections
Social Aspects of Security and Privacy
Social Engineering Attacks
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation