Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
sensitive data
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 1:24pm
Android (operating system)
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
device manufacturers
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
open-source nature
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
resilience
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
biblio
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Submitted by aekwall on Mon, 02/01/2021 - 10:43am
Scalability
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
deep learning
neural nets
image watermarking
attacks
image segmentation
Generative Models
Predictive Metrics
deep neural networks
sensitive data
medical image processing
medical images
diseases
medical professionals
neural style transfer
attacker-chosen disease condition
attacking medical image diagnostics
biomedical image
biomedical imagery
biomedical optical imaging
deep generative models
deep learning tools
defenses
DNN-based image translation attack
eye
healthcare domain
Jekyll
medical domain
medical image diagnostics
neural style transfer framework
patient healthcare
retinal fundus image modalities
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 12:33pm
android encryption
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
Data protection
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
Metrics
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 11:57am
Cryptography
encryption
Receivers
Resiliency
Human behavior
pubcrawl
composability
Metrics
Databases
text analysis
Image color analysis
Public key
public key cryptography
Software algorithms
image colour analysis
sensitive data
asymmetric encryption algorithms
symmetric encryption algorithms
Asymmetric Encryption
Comparison
data encryption techniques
global network
keeping data
RGB color value
RGB Value
RSA and AES
survey
Text-to-Image Encryption
text-to-image encryption algorithms
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
authorisation
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
drones
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
machine learning
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
secure platform
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
sensitive data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
collected location data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
service providers
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
Protocols
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
biblio
Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
security of data
computer network security
Monitoring
data privacy
privacy concerns
Internet of Things
security
Human behavior
pubcrawl
privacy
cyber physical systems
Smart Grid
Smart Grids
sensors
Human Factors
industrial control
taxonomy
security issues
autonomous systems
CPS
security aspects
sensitive data
Intelligent systems
control methods
critical applications
cyber physical system applications
distributive nature
eHealth
innovative technologies
IoT related issues
taxonomy analysis
taxonomy based analysis
vehicular technologies
CPS Privacy
biblio
Fidelius: Protecting User Secrets from Compromised Browsers
Submitted by grigby1 on Fri, 09/11/2020 - 10:58am
security of data
Servers
pubcrawl
Human behavior
Metrics
resilience
Hardware
data privacy
sensitive data
composability
online front-ends
malware
side-channel attacks
Browsers
Compositionality
operating systems (computers)
user interfaces
Browser Security
Keyboards
browser window
Browser-Security
client-side privacy measures
compromised browsers
credit card numbers
Fidelius
fully malicious environment
Hardware-enclave
Malware-protection
page load
Trusted-I/O
user interaction
user secret protection
web browsing sessions
biblio
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Cryptography
encryption
Information Leakage
pubcrawl
composability
Metrics
Resiliency
resilience
sensitive data
Registers
AES
Probes
black-box model attack
countermeasures
dataflow
datapath components
dynamic random mapping
embedded cryptographic implementations
exploitable leakage
fixed S-box
fully controlled access
generic attack
high resolution EM probes
high-performance implementation
localized electromagnetic attack
localized EM attacks
minimum traces to disclosure
permutation network
potent threat
Power Attacks
profiled attack
randomization results
Semiconductor device measurement
side-channel attacks
spatial randomization
state register byte
transient random value
black box encryption
biblio
Privacy Against Brute-Force Inference Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
data privacy
privacy
pubcrawl
optimization
sensitive data
Human Factors
Entropy
policy-based governance
probability
Markov processes
brute-force inference attacks
concave function
concave programming
f-information
guessing leakage
linear program
Linear programming
Mutual information
piece-wise linear function
piecewise linear techniques
privacy-leakage budget
privacy-preserving data release
utility measure
brute force attacks
1
2
3
4
next ›
last »