Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
distributed processing
biblio
Lightweight Crypto-Assisted Distributed Differential Privacy for Privacy-Preserving Distributed Learning
Submitted by
aekwall
on Mon, 01/11/2021 - 12:40pm
Scalability
Servers
encryption
data privacy
distributed processing
Cryptographic Protocols
Data models
learning (artificial intelligence)
privacy leakage
Resiliency
Human behavior
pubcrawl
composability
privacy
differential privacy
mean square error methods
mean squared error
Privacy-preserving
privacy-utility tradeoff
centralized differential privacy
distributed differential privacy
distributed learning
floating-point values
lightweight crypto-assisted distributed differential privacy
privacy guarantees
privacy-preserving distributed learning
private training data
three-layer encryption protocol
trusted server
unbiased encoding
biblio
Secure Determinant Codes: Type-II Security
Submitted by
grigby1
on Tue, 12/15/2020 - 12:28pm
coding theory
Compositionality
Cryptography
distributed processing
distributed storage systems
ℓ compromised nodes
Metrics
per-node storage capacity
pubcrawl
repair bandwidth
resilience
Resiliency
secrecy constraint guarantees
secure determinant codes
secure exact-repair regenerating codes
security
security of data
storage management
type II secrecy
type-II security
biblio
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Submitted by
grigby1
on Mon, 11/02/2020 - 11:09am
Accidents
Ad hoc networks
distributed intrusion detection system
distributed processing
embedded systems
Human Factors
Internet of Vehicles
Internet of Vehicles (IoV)
Internet of vehicles network
Intrusion Detection
IoV network
Metrics
MLP
Multilayer Perceptron
MultiLayer Perceptron neural network
multilayer perceptrons
pubcrawl
resilience
Resiliency
Roads
security attacks
sensors
telecommunication computing
telecommunication security
V2V communication
VANET
Vehicle to Vehicle communication
vehicular ad hoc networks
wireless sensor networks
biblio
Securing connection between IT and OT: the Fog Intrusion Detection System prospective
Submitted by
grigby1
on Fri, 10/16/2020 - 10:32am
anomaly based features
Anomaly Detection
common signature based intrusion detection system
cyberattack
Cybersecurity
deep packet inspection
digital signatures
distributed processing
Fog computing
fog intrusion detection system
ICs
industrial control
industrial control system
Industrial Control Systems
Industrial Informatics
Industrial Internet of Things
industrial IoT devices
information technology network
Internet of Things
Intrusion Detection
intrusion detection system
legacy systems
Monitoring
New Implementation Approaches
operational technology network
production engineering computing
proprietary protocols
Protocols
pubcrawl
resilience
Resiliency
SCADA systems
Scalability
security of data
tools
biblio
Privacy-Enabled Secure Control of Fog Computing Aided Cyber-Physical Systems
Submitted by
aekwall
on Mon, 09/28/2020 - 11:16am
Cryptography
encryption
data privacy
distributed processing
cyber-physical systems
Human behavior
pubcrawl
privacy
security threats
edge computing
Human Factors
fog layer
Perturbation methods
Observers
cyber physical systems
Linear systems
Covariance matrices
industrial process
complicated computation
Data Perturbation
FCA-CPS
Fog computation
fog computing aided CPS
Luenberger observer
observer-based secure control problem
privacy-enabled secure control
Secure control design
secure estimation scheme
CPS Privacy
biblio
Context-Aware Privacy Preservation in a Hierarchical Fog Computing System
Submitted by
aekwall
on Mon, 09/28/2020 - 11:02am
security of data
Scalability
data privacy
Internet of Things
distributed processing
Protocols
game theory
real-time systems
Resiliency
Human behavior
pubcrawl
network topology
Redundancy
quality of service
Topology
Privacy Threats
Ethernet
zero-sum game
content-aware applications
context-aware privacy preservation
decentralized infrastructure
dynamic MDP-based privacy-preserving model
FOG computing environment
hierarchical fog computing system
hierarchical infrastructure
multiple fog node communication
Computing Theory and Privacy
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by
aekwall
on Mon, 09/28/2020 - 11:02am
Scalability
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
privacy preservation
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
elliptic curve
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
environmental prediction
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by
aekwall
on Mon, 09/21/2020 - 2:49pm
Computing Theory
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
differential privacy guarantee
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior
indoor localization
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
pubcrawl
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
biblio
Decentralized Data Marketplace to Enable Trusted Machine Economy
Submitted by
aekwall
on Mon, 09/21/2020 - 2:40pm
Cryptography
data privacy
data integrity
distributed processing
game theory
computer network management
pubcrawl
composability
Decision Making
data providers
Compositionality
transaction processing
financial data processing
distributed ledgers
transaction process
IoT data
contract-oriented interactions
customer experiences
Data marketplace
data marketplaces
decentralization
decentralized architecture
decentralized data marketplace
encrypted message channel
Evolutionary Game Theory
matching process
refunding processes
strategic decision-making
streaming data
trade records
trading policies
trading process
trusted data streams
trusted machine economy
trustless architecture
verifiable Auth-compliant request
Computer Theory and Trust
biblio
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices
Submitted by
aekwall
on Mon, 09/14/2020 - 11:28am
data privacy
Internet of Things
distributed processing
Protocols
privacy leakage
pubcrawl
privacy
Cryptography
Neural networks
Logic gates
recurrent neural nets
edge computing
Speech recognition
Privacy-preserving
additive secret sharing-based interactive protocols
Back propagation through time (BPTT)
forward propagation (FP)
human-machine interaction interface
intelligent IoT device voice control
long short-term memory (LSTM)
long short-term memory neural network
neural network-based speech recognition
outsourced privacy-preserving speech recognition framework
privacy-preserving outsourced speech recognition
smart Internet of Things (IoT) devices
smart IoT devices
composability
1
2
3
4
5
next ›
last »