A Digital Twin-based Privacy Enhancement Mechanism for the Automotive Industry
暂无分享,去创建一个
[1] Jee-Hyong Lee,et al. An approach for multi-label classification by directed acyclic graph with label correlation maximization , 2016, Inf. Sci..
[2] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[3] Michael W. Grieves,et al. Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems , 2017 .
[4] Ling Liu,et al. Role-based and time-bound access and management of EHR data , 2014, Secur. Commun. Networks.
[5] Pierangela Samarati,et al. Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project , 2010, J. Comput. Secur..
[6] Elisa Bertino,et al. Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..
[7] Archana Ganapathi,et al. Analysis and Lessons from a Publicly Available Google Cluster Trace , 2010 .
[8] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[9] Dimitrios Gunopulos,et al. Discovering similar multidimensional trajectories , 2002, Proceedings 18th International Conference on Data Engineering.
[10] Michael Dahlin,et al. Machine Learning for On-Line Hardware Reconfiguration , 2007, IJCAI.
[11] Xing Xie,et al. Collaborative location and activity recommendations with GPS history data , 2010, WWW '10.
[12] Geoffrey E. Hinton,et al. Restricted Boltzmann machines for collaborative filtering , 2007, ICML '07.
[13] Ruoyu Wu,et al. Secure sharing of electronic health records in clouds , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[14] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[15] Arkajit Dey,et al. PseudoID: Enhancing Privacy in Federated Login , 2010 .
[16] Isaac Agudo,et al. BlindIdM: A privacy-preserving approach for identity management as a service , 2014, International Journal of Information Security.
[17] Thad Starner,et al. Learning Significant Locations and Predicting User Movement with GPS , 2002, Proceedings. Sixth International Symposium on Wearable Computers,.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[20] Henry A. Kautz,et al. Inferring High-Level Behavior from Low-Level Sensors , 2003, UbiComp.
[21] Jie Xu,et al. An Approach for Characterizing Workloads in Google Cloud to Derive Realistic Resource Utilization Models , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[22] Xin Li,et al. Conditional Restricted Boltzmann Machines for Multi-label Learning with Incomplete Labels , 2015, AISTATS.
[23] Samee Ullah Khan,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .
[24] Hiroki Arimura,et al. Pattern Mining from Trajectory GPS Data , 2012, 2012 IIAI International Conference on Advanced Applied Informatics.
[25] Siu-Ming Yiu,et al. SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment , 2012, ACNS.
[26] Geoffrey E. Hinton,et al. Factored conditional restricted Boltzmann Machines for modeling motion style , 2009, ICML '09.
[27] B. Schölkopf,et al. Modeling Human Motion Using Binary Latent Variables , 2007 .
[28] Ian Sommerville,et al. Workload Classification & Software Energy Measurement for Efficient Scheduling on Private Cloud Platforms , 2011, ArXiv.
[29] Dimitrios Gunopulos,et al. Efficient Mining of Spatiotemporal Patterns , 2001, SSTD.
[30] ZhangRui,et al. Role-based and time-bound access and management of EHR data , 2014 .
[31] Henry A. Kautz,et al. Learning and inferring transportation routines , 2004, Artif. Intell..
[32] Arshdeep Bahga,et al. Synthetic Workload Generation for Cloud Computing Applications , 2011, J. Softw. Eng. Appl..
[33] Hsien-Hsin S. Lee,et al. Constructing a Non-Linear Model with Neural Networks for Workload Characterization , 2006, 2006 IEEE International Symposium on Workload Characterization.
[34] Jian-Guo Bau,et al. Secure Dynamic Access Control Scheme of PHR in Cloud Computing , 2012, Journal of Medical Systems.
[35] Spyros Antonatos,et al. FPVI: A scalable method for discovering privacy vulnerabilities in microdata , 2016, 2016 IEEE International Smart Cities Conference (ISC2).
[36] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[37] Michael Backes,et al. PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale , 2016, 2018 IEEE International Conference on Communications (ICC).
[38] Javier López,et al. Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[39] Thad Starner,et al. Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.
[40] Sonali Aggarwal,et al. Characterization of Hadoop Jobs Using Unsupervised Learning , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[41] Paresh Keshubhai Nakrani. Smart Car Technologies: A Comprehensive Study of the State of the Art with Analysis and Trends , 2015 .
[42] Chita R. Das,et al. Towards characterizing cloud backend workloads: insights from Google compute clusters , 2010, PERV.
[43] Jiawei Han,et al. Efficient mining of partial periodic patterns in time series database , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).