×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [12]
内容类型
期刊论文 [12]
发表日期
2022 [12]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
发表日期:2022
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model
期刊论文
Sensors, 2022, 卷号: 22, 期号: 15
作者:
Cao, Laicheng
;
Zhu, Min
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2022/09/22
Energy efficiency
Pollution
Privacy-preserving techniques
Camouflage attack
Effective trust cluster formulation scheme
Fuzzy trusts
Game models
Low consumption
Low-high
Optimal cluster
Pollution attack
Privacy preserving
Repeated games
A location privacy protection method based on cipher-text retrieval in cloud environment
期刊论文
SECURITY AND PRIVACY, 2022
作者:
Zhang, Yongbing
;
Zhang, Qiuyu
;
Jiang, Yilong
;
Yan, Yan
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/07/19
cipher-text retrieval
location privacy protection
location-based service
Morton code
top-k sorting
Achieving Differential Privacy Publishing of Location-Based Statistical Data Using Grid Clustering
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2022, 卷号: 11, 期号: 7
作者:
Yan, Yan
;
Sun, Zichao
;
Mahmood, Adnan
;
Xu, Fei
;
Dong, Zhuoyue
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/08/09
statistical release of big data
location privacy
differential privacy
privacy spatial decomposition
grid clustering
A differentially private nonnegative matrix factorization for recommender system
期刊论文
Information Sciences, 2022, 卷号: 592, 页码: 21-35
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/04/21
Benchmarking
Collaborative filtering
Economic and social effects
Information services
Large dataset
Matrix algebra
Matrix factorization
Privacy-preserving techniques
Differential privacies
Factorization methods
Filtering problems
Imputation
Non-negativity
Nonnegative matrix factorization
Objective functions
Personalized information services
Polynomial expression
User data
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
A differentially private matrix factorization based on vector perturbation for recommender system
期刊论文
Neurocomputing, 2022, 卷号: 483, 页码: 32-41
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2022/04/21
Benchmarking
Data privacy
Matrix algebra
Matrix factorization
Sensitivity analysis
Differential privacies
Error accumulation
Factorization techniques
Matrix factorizations
Multiple iterations
Objective functions
Privacy preservation
Privacy protection
User data
Vector perturbation
高效抗合谋攻击分布式机器学习隐私保护方案
期刊论文
华中科技大学学报(自然科学版), 2022, 卷号: 50, 期号: 5, 页码: 1-7
作者:
曹来成
;
吴琪瑞
;
吴蓉
;
郭显
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2022/04/21
机器学习
分布式系统
抗合谋攻击
云存储
差分隐私
Statistics release and privacy protection method of location big data based on deep learning
期刊论文
Tongxin Xuebao/Journal on Communications, 2022, 卷号: 43, 期号: 1, 页码: 203-216
作者:
Yan, Yan
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/04/21
Big data
Budget control
Data privacy
Deep learning
Efficiency
Forecasting
Publishing
Data publishing
Deep learning
Differential privacies
Location privacy
Partition structures
Privacy protection
Privacy protection data publishing
Private spatial decomposition
Protection methods
Spatial decompositions
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
©版权所有 ©2017 CSpace - Powered by
CSpace