×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [3]
自动化研究所 [3]
清华大学 [2]
兰州理工大学 [2]
厦门大学 [1]
西安交通大学 [1]
更多...
内容类型
期刊论文 [15]
发表日期
2022 [2]
2021 [1]
2018 [1]
2017 [1]
2014 [4]
2013 [2]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
限定条件
内容类型:期刊论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model
期刊论文
Sensors, 2022, 卷号: 22, 期号: 15
作者:
Cao, Laicheng
;
Zhu, Min
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2022/09/22
Energy efficiency
Pollution
Privacy-preserving techniques
Camouflage attack
Effective trust cluster formulation scheme
Fuzzy trusts
Game models
Low consumption
Low-high
Optimal cluster
Pollution attack
Privacy preserving
Repeated games
A differentially private nonnegative matrix factorization for recommender system
期刊论文
Information Sciences, 2022, 卷号: 592, 页码: 21-35
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/04/21
Benchmarking
Collaborative filtering
Economic and social effects
Information services
Large dataset
Matrix algebra
Matrix factorization
Privacy-preserving techniques
Differential privacies
Factorization methods
Filtering problems
Imputation
Non-negativity
Nonnegative matrix factorization
Objective functions
Personalized information services
Polynomial expression
User data
epsilon-k anonymization and adversarial training of graph neural networks for privacy preservation in social networks
期刊论文
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2021, 卷号: 50, 页码: 17
作者:
Tian, Hu
;
Zheng, Xiaolong
;
Zhang, Xingwei
;
Zeng, Daniel Dajun
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2021/12/28
Privacy preservation
Anonymization
Graph neural networks
Social network
Secure and privacy-preserving data sharing in the cloud based on lossless image coding
期刊论文
SIGNAL PROCESSING, 2018, 卷号: 148, 页码: 91-101
作者:
Khelifi, Fouad
;
Brahimi, Tahar
;
Han, Jungong
;
Li, Xuelong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2018/12/11
Reversible Data Hiding
Encryption
Confidentiality
Security
Capacity
Privacy-preserving Cloud
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks
期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 卷号: 20, 页码: 2439-2450
作者:
Vijayakumar, Pandi
;
Azees, Maria
;
Chang, Victor
;
Deborah, Jegatha
;
Balusamy, Balamurugan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Key distribution
Privacy
Anonymous signature
Anonymous authentication
Computational cost
Group key
Integrity
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
期刊论文
computer networks, 2014
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2015/11/10
Two-factor authentication
Wireless sensor networks
User anonymity
Smart card
Non-tamper resistant
REMOTE USER AUTHENTICATION
KEY AGREEMENT SCHEME
SMART CARDS
MUTUAL AUTHENTICATION
SECURITY ENHANCEMENT
ROAMING SERVICES
HASH FUNCTIONS
MESH NETWORKS
EFFICIENT
PROTOCOL
Survey on the location privacy preservation in the internet of things
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2014
Sun, Li-Min
;
Li, Hong
;
Wang, Xiao-Han
;
He, Yun-Hua
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2017/12/03
A central tendency-based privacy preserving model for sensitive XML association rules using Bayesian networks
期刊论文
INTELLIGENT DATA ANALYSIS, 2014, 卷号: 18, 期号: 2, 页码: 281-303
作者:
Iqbal, Khalid
;
Yin, Xu-Cheng
;
Hao, Hong-Wei
;
Ilyas, Qazi Mudassar
;
Yin, Xuwang
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2015/08/12
Privacy preservation
XML
Bayesian networks
sensitive information
sensitive XML association rules
A central tendency-based privacy preserving model for sensitive XML association rules using Bayesian networks
期刊论文
INTELLIGENT DATA ANALYSIS, 2014, 卷号: 18, 期号: 2;2, 页码: 281-303
作者:
Iqbal, Khalid
;
Yin, Xu-Cheng
;
Hao, Hong-Wei
;
Ilyas, Qazi Mudassar
;
Yin, Xuwang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/10/27
Privacy Preservation
Xml
Bayesian Networks
Sensitive Information
Sensitive Xml Association Rules
Proximity-Based Security Techniques for Mobile Users in Wireless Networks
期刊论文
http://dx.doi.org/10.1109/TIFS.2013.2286269, 2013
Xiao, Liang
;
Yan, Qiben
;
Lou, Wenjing
;
Chen, Guiquan
;
Hou, Y. Thomas
;
肖亮
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/07/22
SOCIAL NETWORKS
PRIVACY
CHANNELS
©版权所有 ©2017 CSpace - Powered by
CSpace