Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
k-anonymity
biblio
TMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use
Submitted by
grigby1
on Thu, 01/31/2019 - 11:19am
anonymity
anonymization
composability
gaussian distribution
Global Positioning System
Human behavior
Human Factors
k-anonymity
Metrics
perturbation
Perturbation methods
Pk-anonymity
privacy
privacy preservation
pubcrawl
resilience
Resiliency
TMk-anonymity
biblio
Dummy Location Selection Scheme for K-Anonymity in Location Based Services
Submitted by
grigby1
on Mon, 04/02/2018 - 11:31am
anonymity
Artificial Intelligence
cloaking area based algorithm
Complexity theory
composability
data privacy
dummy location
Geometry
Human behavior
K-1 dummy locations
k-anonymity
LBS
localization information
location based services
low complexity dummy location selection scheme
Metrics
mobile computing
multiobjective optimization problem
optimisation
optimization
privacy
privacy concerns
probability
pubcrawl
query probability
query processing
resilience
Resiliency
security
Security analysis
security of data
Servers
biblio
Implementing A Framework for Big Data Anonymity and Analytics Access Control
Submitted by
grigby1
on Mon, 04/02/2018 - 11:30am
Access Control
analytics access control
anonymity
anonymization
authorisation
authorization
Big Data
Big Data anonymity framework
composability
data analysis
data anonymization methods
data management
data privacy
Data processing
data suppression
framework standardization
Hadoop ecosystems
Human behavior
k-anonymity
MapReduce
Metrics
privacy protection
pubcrawl
resilience
Resiliency
Sensitivity
tools
biblio
Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol
Submitted by
grigby1
on Mon, 03/19/2018 - 12:45pm
6LoWPAN
Ad hoc networks
composability
Cyber Physical Systems Security
enhancing sink node anonymity
IEEE 802.15 Standard
IEEE 802.15.4
k-anonymity
Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol
military communication
modified LOADng protocol
privacy
pubcrawl
reactive routing protocol
remote sensing
resilience
Resiliency
Routing
Routing protocols
security
sensor networks
sensor nodes
sink-node vulnerability
specific routing protocol
tactical sensor networks
tactical wireless sensor networks
tactical WSN
telecommunication security
wireless sensor networks
WSN communication protocols
biblio
Enhance Privacy in Big Data and Cloud via Diff-Anonym Algorithm
Submitted by
grigby1
on Tue, 02/06/2018 - 12:42pm
accurate data
Big Data
big data privacy
cloud
Cloud Computing
Computers
data anonymity
Data models
data privacy
diff-anonym algorithm
differential privacy
Human Factors
Influenza
k-anonymity
Metrics
Policy
privacy
privacy assurance
privacy enhancement
privacy guarantee rate
privacy infringement
privacy models
private data
pubcrawl
Resiliency
Scalability
biblio
An Efficient Anonymous System for Transaction Data
Submitted by
grigby1
on Thu, 05/18/2017 - 1:20pm
aonymous
Human behavior
k-anonymity
Kerberos
Metrics
pubcrawl
Resiliency
set-valued
Transaction Data
TSP
biblio
Face de-identification using facial identity preserving features
Submitted by
grigby1
on Wed, 03/08/2017 - 1:13pm
Active appearance model
automated human facial image de-identification
data privacy
Databases
deep learning
deep learning-based facial identity-preserving features
Face
face blurring techniques
face de-identification
face recognition
face representation
facial identity preserving features
facial image identity recognition
facial images
image recognition
intelligent surveillance applications
intra-identity variances
k-anonymity
k-anonymity facial image de-identification
learning (artificial intelligence)
machine learning
privacy
privacy protection
privacy-preserving social media
pubcrawl170113
social networking (online)
surveillance
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by
BrandonB
on Mon, 05/04/2015 - 1:16pm
ban zones
Buildings
cartography
Cities and towns
data privacy
dynamic map-based blinding out
embedded sensors
habitat density
k-anonymity
large-scale sensing systems
location data
map-based silent zones
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile phones
participatory sensing
performance evaluation
privacy
privacy level
security of data
sensors
user privacy protection
wireless sensor networks