×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [27]
内容类型
会议论文 [27]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共27条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:湖南大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding
会议论文
IEEE Conference on Communications and Network Security, 2018
作者:
Liu, Q
;
Wu, SX
;
Pei, SY
;
Wu, J
;
Peng, T
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/17
Cloud computing
order-preserving encryption
multi-attribute range queries
security
efficiency
Golgi phosphoprotein 3 promotes hepatocellular carcinoma progression by activating mTOR signaling pathway
会议论文
BMC CANCER, 2018
作者:
Liu, HY
;
Wang, XQ
;
Feng, B
;
Tang, LP
;
Li, WP
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/25
GOLPH3
Hepatocellular
carcinoma
mTOR
signaling
pathway
Authentication of Multi-dimensional Top-K Query on Untrusted Server
会议论文
26th IEEE/ACM International Symposium on Quality of Service (IWQoS), Banff, CANADA, 2018
作者:
Zhu, XY
;
Wu, J
;
Chang, W
;
Wang, GJ
;
Liu, Q
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/25
Data outsourcing
multi-dimension
query authentication
top-k query
Study on validation method for femur finite element model under multiple loading conditions
会议论文
2017 International Symposium on Application of Materials Science and Energy Materials (SAMSE 2017), Shanghai, China, 2017
作者:
Guan, FJ
;
Zhang, GJ
;
Liu, J
;
Wang, SJ
;
Luo, X
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/12/26
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services
会议论文
15th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) / 16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), Guangzhou, PEOPLES R CHINA, 2017
作者:
Zhang, SB
;
Wang, GJ
;
Liu, Q
;
Wen, X
;
Liao, JG
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
Trajectory Privacy
Dual-K Mechanism
K-anonymity
Location Selection
Exploring user topic influence for group recommendation on learning resources
会议论文
IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation Conference (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), San Francisco, CA, 2017
作者:
Wang, F
;
Jiang, WJ
;
Chen, SH
;
Xie, DQ
;
Wang, GJ
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
group recommendation
learning resource recommendation
probabilistic generative model
user influence
topic model
DABKS: Dynamic Attribute-based Keyword Search in Cloud Computing
会议论文
2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017
作者:
Hu, BS
;
Liu, Q
;
Liu, XH
;
Peng, T
;
Wang, GJ
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/26
cloud computing
searchable encryption
finegrained search authorization
dynamic access policy
Data-driven Influence Learning in Social Networks
会议论文
15th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) / 16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), Guangzhou, PEOPLES R CHINA, 2017
作者:
Wang, F
;
Jiang, WJ
;
Wang, GJ
;
Xie, DQ
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/12/26
Influence learning
Online social networks
Data driven
Influence maximization
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks
会议论文
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 58-64, 2017
作者:
Luo, E
;
Wang, GJ
;
Liu, Q
;
IEEE
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
Personal Attribute Profile
Private Matching
Privacy-Preserving
Identity Authentication
Key Agreement
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
会议论文
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 402-408, 2017
作者:
Zhang, SB
;
Wang, GJ
;
Liu, Q
;
IEEE
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/26
Location-Based Services
Trajectory and Content Privacy
Multiple Anonymizers
Shamir Threshold
K-anonymity
©版权所有 ©2017 CSpace - Powered by
CSpace