Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
"Towards Making Systems Forget with Machine Unlearning"
Submitted by grigby1 on Thu, 02/23/2017 - 12:32pm
machine learning algorithms
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
pubcrawl170105
pubcrawl
privacy risks
machine unlearning
Adversarial Machine Learning
Learning systems
learning (artificial intelligence)
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
biblio
"Discovery of De-identification Policies Considering Re-identification Risks and Information Loss"
Submitted by grigby1 on Thu, 02/23/2017 - 12:14pm
Lattices
Upper bound
UCI machine learning repository
Synthetic aperture sonar
Safe Harbor
risk analysis
reidentification risks
pubcrawl170105
privacy leakage
privacy
learning (artificial intelligence)
Computational modeling
information loss
information entropy
HIPPA
Entropy
deidentified data
deidentification policies
de-identification
data privacy
data analysis
biblio
"DIVa: Decentralized identity validation for social networks"
Submitted by grigby1 on Thu, 02/23/2017 - 12:05pm
learning (artificial intelligence)
user profile attribute
social networking (online)
Social network services
security
real-world OSN dataset
pubcrawl170105
Privacy-preserving Learning
privacy preservation
privacy
online social network
mining technique
association rules
fine-grained community-aware correlation
Ensemble Learning
DIVa
Decentralized Online Social Networks
decentralized learning approach
decentralized identity validation
data privacy
Data mining
Correlation
Computational modeling
Community-aware Identity Validation
biblio
"Stealthy attacks meets insider threats: A three-player game model"
Submitted by abfox on Tue, 02/14/2017 - 1:18pm
advanced persistent threat
Computational modeling
computer security
cyber security
Face
game theory
Games
Insider Threats
Numerical models
pubcrawl170101
real-time systems
security of data
stealthy attacks
three-player attacker-defender insider game
three-player game model
two-player FlipIt game model
biblio
"AD2: Anomaly detection on active directory log data for insider threat monitoring"
Submitted by abfox on Tue, 02/14/2017 - 12:14pm
Data models
pubcrawl170101
probability
Organizations
Monitoring
Markov processes
malware detection system
machine learning
learning (artificial intelligence)
invasive software
insider threat monitoring
Hidden Markov models
active directory domain service log
cyber security monitoring
computer security
Computational modeling
behavioural sciences computing
Behavioral Modeling
behavioral analytic framework
Anomaly Detection
advanced persistent threat
AD2
active directory log data
Active Directory Log Analysis
file
Khalaj_Impact_Analysis.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 2:33pm
Abstracts
Apr'15
CMU
Computational modeling
Context
Microwave integrated circuits
Runtime
Syntactics
biblio
Impact Analysis based on a Global Hierarchical Object Graph
Submitted by Jamie Presken on Mon, 12/05/2016 - 2:33pm
Abstracts
Apr'15
CMU
Computational modeling
Context
Microwave integrated circuits
Runtime
Syntactics
CMU
Apr'15
biblio
Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
stochastic incomplete feedback
nearest neighbor
real-time control
root mean square error
spatial correlation
spatial data recovery scheme
Spatial databases
stochastic data
stochastic feedback data
measurement uncertainty
Stochastic processes
stochastic traffic patterns
System performance
temporal correlation
temporal data recovery scheme
temporal model identification
time-critical traffic patterns
efficient temporal and spatial data recovery
Computational modeling
Correlation
CPS
cyber-physical system
cyber-physical systems
data handling
Data models
data recovery scheme
auto regressive integrated moving average
ETSDR scheme
feedback loss
incomplete feedback data
integral of absolute error
Mathematical model
mean absolute error
mean square error methods
biblio
A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL designs
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
high level functionality verification
unified sequential equivalence checking approach
Sequential equivalence checking
sequence of states
RTL design verification
RTL design
Protocols
protocol specification implementation
Integrated circuit modeling
high-level models
high level synthesis
high level reference model
high level model
Abstracts
formal verification
formal technique
Formal Specification
electronic design automation
Educational institutions
design verification
design under verification
Data models
Computational modeling
computational margin
communication protocol
Calculators
biblio
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
Indexes
bilinear pairings
CDH problem
Cloud Computing
computational Diffie-Hellman problem
Computational modeling
Cryptographic Protocols
data integrity
delegated verification
distributed computing
Distributed databases
formal system model
formal verification
ID-DPDP protocol
identity-based cryptography
identity-based distributed provable data possession
storage management
integrity checking protocol
multicloud servers
multicloud storage
outsourced data
private key cryptography
private verification
Protocols
provable data possession
public key cryptography
public verification
remote data integrity checking model
security
security model
Servers
« first
‹ previous
…
66
67
68
69
70
71
72
73
74
next ›
last »