×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业技... [35]
西安交通大学 [24]
北京航空航天大学 [22]
厦门大学 [21]
兰州理工大学 [19]
山东大学 [12]
更多...
内容类型
期刊论文 [151]
会议论文 [49]
学位论文 [20]
其他 [4]
会议 [1]
发表日期
2023 [2]
2022 [9]
2021 [4]
2020 [6]
2019 [16]
2018 [32]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共225条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
FedFV: A Personalized Federated Learning Framework for Finger Vein Authentication
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 5, 页码: 683-696
作者:
Feng-Zhao Lian
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2023/09/25
Finger vein, personalized federated learning, privacy protection, biometric, authentication
Federated Learning with Privacy-preserving and Model IP-right-protection
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 1, 页码: 19-37
作者:
Qiang Yang
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/01/18
Federated learning
privacy-preserving machine learning
security
decentralized learning
intellectual property protection
A survey on federated learning: challenges and applications
期刊论文
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2022, 页码: 23
作者:
Wen, Jie
;
Zhang, Zhixia
;
Lan, Yang
;
Cui, Zhihua
;
Cai, Jianghui
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/12/27
Federated learning
Machine learning
Privacy protection
Personalized federated learning
IrisGuard: Image Forgery Detection for Iris Anti-spoofing
会议论文
Beijing, 2022.12.11-2022.12.13
作者:
Zhuo, Wenqi
;
Wang, Wei
;
Zhang, Hui
;
Dong, Jing
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2023/05/31
iris anti-spoofing
image forgery detection
privacy protection
Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 11
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Mao, Wenji
;
Zeng, Daniel Dajun
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/11/14
Perturbation methods
Semantics
Computational modeling
Codes
Task analysis
Privacy
Software
Adversarial perturbation
deep neural network (DNN)
privacy protection
semantic retrieval
A location privacy protection method based on cipher-text retrieval in cloud environment
期刊论文
SECURITY AND PRIVACY, 2022
作者:
Zhang, Yongbing
;
Zhang, Qiuyu
;
Jiang, Yilong
;
Yan, Yan
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2022/07/19
cipher-text retrieval
location privacy protection
location-based service
Morton code
top-k sorting
A differentially private matrix factorization based on vector perturbation for recommender system
期刊论文
Neurocomputing, 2022, 卷号: 483, 页码: 32-41
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2022/04/21
Benchmarking
Data privacy
Matrix algebra
Matrix factorization
Sensitivity analysis
Differential privacies
Error accumulation
Factorization techniques
Matrix factorizations
Multiple iterations
Objective functions
Privacy preservation
Privacy protection
User data
Vector perturbation
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
Statistics release and privacy protection method of location big data based on deep learning
期刊论文
Tongxin Xuebao/Journal on Communications, 2022, 卷号: 43, 期号: 1, 页码: 203-216
作者:
Yan, Yan
;
Cong, Yiming
;
Mahmood, Adnan
;
Sheng, Quanzheng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/21
Big data
Budget control
Data privacy
Deep learning
Efficiency
Forecasting
Publishing
Data publishing
Deep learning
Differential privacies
Location privacy
Partition structures
Privacy protection
Privacy protection data publishing
Private spatial decomposition
Protection methods
Spatial decompositions
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
©版权所有 ©2017 CSpace - Powered by
CSpace