Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
privacy protection
biblio
Secret Numerical Interval Decision Protocol for Protecting Private Information and Its Application
Submitted by grigby1 on Fri, 02/17/2023 - 5:20pm
privacy protection
Scientific Computing Security
secret comparison
numerical range
Morton code
Asia
Homomorphic encryption
scientific computing
Compositionality
information security
Decision Making
Protocols
privacy
Resiliency
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
Efficient 5G Network Slicing Selection with Privacy in Smart Grid
Submitted by grigby1 on Fri, 01/20/2023 - 5:03pm
feature extraction
pubcrawl
Metrics
Resiliency
Safety
privacy
5G mobile communication
Smart Grid
estimation
Smart Grids
privacy protection
network slicing
5G network slicing selection
match estimation
Smart Grid Privacy
biblio
Big Data Analysis and Mining Technology of Smart Grid Based on Privacy Protection
Submitted by grigby1 on Fri, 01/20/2023 - 4:59pm
information security
pubcrawl
Metrics
Resiliency
privacy
data privacy
Protocols
Smart Grid
Big Data
Companies
privacy protection
Meters
Data mining
Smart Grid Privacy
biblio
FedMix: A Sybil Attack Detection System Considering Cross-layer Information Fusion and Privacy Protection
Submitted by aekwall on Thu, 01/05/2023 - 5:10pm
vehicular ad hoc networks
Sybil attack detection
privacy protection
sybil attacks
information fusion
Cross layer design
ANN
federated learning
data integrity
privacy
composability
Resiliency
Metrics
pubcrawl
Analytical models
data privacy
Training
biblio
Location Based Privacy Protection Data Interference Method
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
Compositionality
Data interference
Soft sensors
Location Privacy in Wireless Networks
location privacy
Phantoms
privacy protection
Publishing
wireless networks
energy consumption
pubcrawl
composability
wireless sensor networks
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
TSITE IP: A Case Study of Intellectual Property Distributed Platform based on Cloud Services
Submitted by grigby1 on Mon, 10/03/2022 - 12:19pm
Market research
TSITE
Operation Service
distributed computing
Resiliency
Information age
ip protection
Government
Distributed databases
Cloud Computing
intellectual property
privacy protection
composability
Computers
resilience
policy-based governance
pubcrawl
biblio
Privacy Protection Method for Experts' Evaluation Ability Calculation of Peer Review
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
pubcrawl
Human behavior
Scalability
privacy
data privacy
Information systems
computer security
Perturbation methods
privacy protection
usability
expert systems
Human Factors
Data Perturbation
evaluation ability
peer review
biblio
Service Quality Loss-aware Privacy Protection Mechanism in Edge-Cloud IoTs
Submitted by grigby1 on Fri, 08/26/2022 - 1:25pm
privacy protection
Repeated game
localized differential privacy
Incentive mechanism
Control Theory
Propagation losses
crowdsourcing
game theory
Market research
Servers
Games
sensors
privacy
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted Data
Submitted by grigby1 on Thu, 07/14/2022 - 3:40pm
pubcrawl
Tomography
Scalability
quantum state
quantum machine learning
Quantum homomorphic encryption
quantum computing security
quantum computing
Quantum cloud computing
Computing Theory
privacy protection
machine learning algorithms
IBM Quantum Experience
feature extraction
dimensionality reduction
Cloud Computing
trust
biblio
A Blockchain-Assisted Privacy-Preserving Cloud Computing Method with Multiple Keys
Submitted by grigby1 on Mon, 05/09/2022 - 4:36pm
Cloud Computing
Servers
pubcrawl
resilience
Resiliency
privacy
data privacy
Protocols
blockchain
privacy protection
Public key
Scalability
Homomorphic encryption
user privacy in the cloud
blockchains
multiple keys
1
2
3
4
5
6
7
8
9
…
next ›
last »