Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
advertising
biblio
Privacy Policy in Online Social Network with Targeted Advertising Business
Submitted by grigby1 on Tue, 10/12/2021 - 1:54pm
advertising
data privacy
Human behavior
online social network
privacy
Privacy Policies
pubcrawl
Scalability
Social network services
Targeted Advertising
biblio
CAMTA: Causal Attention Model for Multi-touch Attribution
Submitted by aekwall on Thu, 05/13/2021 - 10:48am
social networking (online)
Touchpoints
temporal modeling
Multi-touch attribution
causality
Attention
Conversions
advertising
Channel estimation
Data models
Recurrent neural networks
Predictive models
attribution
Metrics
resource management
composability
pubcrawl
Human behavior
biblio
Hash Retrieval Method for Recaptured Images Based on Convolutional Neural Network
Submitted by aekwall on Mon, 03/29/2021 - 11:08am
advertising data processing
retrieving algorithm
retrieval performance
recaptured image retrieval
recaptured advertising images
outdoor advertising market researching
hashing method
hash retrieval method
hash layer
binary hash code output
AD images
Convolutional codes
hash algorithms
Cryptography
advertising
Binary codes
Compositionality
image retrieval
visualization
pubcrawl
convolutional neural networks
convolutional neural network
Training
Robustness
Resiliency
feature extraction
biblio
Conditional Anonymity enabled Blockchain-based Ad Dissemination in Vehicular Ad-hoc Network
Submitted by grigby1 on Thu, 01/28/2021 - 12:59pm
resilience
Human behavior
in-vehicle service
internal attacker scenarios
malicious users
message authentication
Metrics
monitoring authority
privacy
pubcrawl
fake ads
Resiliency
vehicle-to-infrastructure communication
vehicle-to-vehicle communication
vehicular ad hoc networks
Vehicular Ad-hoc Network
vehicular network
zero-knowledge proof of knowledge
ZKPoK
certification authority
advertisement sharing
advertising
anonymity
authenticated users
behavioural privacy leakage
blockchain
blockchain-based ad dissemination
certificate-less cryptography
ad dissemination
composability
conditional anonymity
cryptocurrencies
Cryptography
data privacy
delays
Distributed databases
fair incentive mechanism
biblio
Tracking location privacy leakage of mobile ad networks at scale
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
extensive threat measurements
privacy models and measurement
targeted ad deliveries
privacy leakage threats
potential privacy leakage
online advertising ecosystem
mobile ads
mobile ad networks
mobile ad ecosystem
mobile ad businesses privacy leakage behaviors
massive data collection
location-based mobile advertising services
large-scale measurement study
security of data
advertising data processing
advertising
adaptive location obfuscation mechanism
location data
Ecosystems
Metrics
privacy
Google
pubcrawl
mobile computing
Adaptation models
data privacy
biblio
Tracking location privacy leakage of mobile ad networks at scale
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
extensive threat measurements
privacy models and measurement
targeted ad deliveries
privacy leakage threats
potential privacy leakage
online advertising ecosystem
mobile ads
mobile ad networks
mobile ad ecosystem
mobile ad businesses privacy leakage behaviors
massive data collection
location-based mobile advertising services
large-scale measurement study
security of data
advertising data processing
advertising
adaptive location obfuscation mechanism
location data
Ecosystems
Metrics
privacy
Google
pubcrawl
mobile computing
Adaptation models
data privacy
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 11:32am
BLE Beacon Privacy management
Privacy Policies
user-driven privacy policy configuration
user experience
User behavior
trustworthy privacy management
Receivers
proof-of-concept app
Policy Management
policy configuration platform
bluetooth low energy beacon
bluetooth low energy
BLE signals
BLE Beacons
Internet of Things
beacon privacy manager
advertising
telecommunication network management
telecommunication computing
smart phones
Privacy Policy
Scalability
data privacy
telecommunication security
Human behavior
pubcrawl
Bluetooth
privacy
biblio
Redesigning QR Code Ecosystem with Improved Mobile Security
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
mobile marketing
Software
security threat
security risks
risk analysis
redesigned QR code ecosystem
QR codes
QR code
public key infrastructure
Public key
pubcrawl170112
Mobile Security
advertising
mobile computing
life cycle
information system
Ecosystems
Ecosystem
digital signatures
digital signature mechanism
digital signature
Decoding
authentication
advertising campaigns
biblio
Multi-touch Attribution in Online Advertising with Survival Theory
Submitted by BrandonB on Mon, 05/04/2015 - 1:18pm
internet
user interaction data
user conversion probability prediction
survival theory
rule-based attribution models
probability
probabilistic framework
Predictive models
online advertising
Multi-touch attribution
Kernel
advertising
Hidden Markov models
Hazards
Gold
digital advertising
data-driven multitouch attribution models
Data models
data handling
commercial advertising monitoring company
advertising data processing
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
1
2
next ›
last »