×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [42]
武汉大学 [38]
西安交通大学 [29]
山东大学 [22]
兰州理工大学 [13]
中南大学 [12]
更多...
内容类型
期刊论文 [166]
会议论文 [61]
其他 [11]
会议 [2]
发表日期
2023 [2]
2022 [5]
2021 [2]
2020 [1]
2019 [38]
2018 [48]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共240条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 10, 页码: 1984-1999
作者:
Feiye Zhang
;
Qingyu Yang
;
Dou An
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2023/09/07
Centralized training and decentralized execution
demand side management
multi-agent reinforcement learning
privacy preserving
Federated Learning with Privacy-preserving and Model IP-right-protection
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 1, 页码: 19-37
作者:
Qiang Yang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2023/01/18
Federated learning
privacy-preserving machine learning
security
decentralized learning
intellectual property protection
Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model
期刊论文
Sensors, 2022, 卷号: 22, 期号: 15
作者:
Cao, Laicheng
;
Zhu, Min
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2022/09/22
Energy efficiency
Pollution
Privacy-preserving techniques
Camouflage attack
Effective trust cluster formulation scheme
Fuzzy trusts
Game models
Low consumption
Low-high
Optimal cluster
Pollution attack
Privacy preserving
Repeated games
A differentially private nonnegative matrix factorization for recommender system
期刊论文
Information Sciences, 2022, 卷号: 592, 页码: 21-35
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/04/21
Benchmarking
Collaborative filtering
Economic and social effects
Information services
Large dataset
Matrix algebra
Matrix factorization
Privacy-preserving techniques
Differential privacies
Factorization methods
Filtering problems
Imputation
Non-negativity
Nonnegative matrix factorization
Objective functions
Personalized information services
Polynomial expression
User data
APRIL: Finding the Achilles' Heel on Privacy for Vision Transformers
会议论文
New Orleans, Louisiana, USA, 2022-6
作者:
Jiahao, Lu
;
Xi Sheryl, Zhang
;
Tianli, Zhao
;
Xiangyu, He
;
Jian Cheng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2022/06/23
Trustworthy AI
Privacy-preserving machine learning
A Framework for Distributed Semi-supervised Learning Using Single-layer Feedforward Networks
期刊论文
Machine Intelligence Research, 2022, 卷号: 19, 期号: 1, 页码: 63-74
作者:
Jin Xie, San-Yang Liu, Jia-Xi Chen
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2022/01/25
Distributed learning (DL)
semi-supervised learning (SSL)
manifold regularization (MR)
single layer feed-forward neural network (SLFNN)
privacy preserving
Privacy-Preserving Publicly Verifiable Databases
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 3, 页码: 1639-1654
作者:
Wang Q(王强)
;
Zhou FC(周福才)
;
Zhou BY(周搏洋)
;
Xu J(徐剑)
;
Chen CY(陈春雨)
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/05/29
Cloud computing
Encryption
Protocols
Indexes
Verifiable databases
privacy-preserving
publicly verifiable
cloud computing
A blockchain-empowered AAA scheme in the large-scale HetNet
期刊论文
DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 卷号: 7, 期号: 3, 页码: 308-316
作者:
Shi, Na
;
Tan, Liang
;
Li, Wenjuan
;
Qi, Xin
;
Yu, Keping
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2021/12/01
HetNet
AAA
Privacy preserving
Blockchain
Transaction
A weighted K-member clustering algorithm for K-anonymization
期刊论文
COMPUTING, 2021, 卷号: 103, 期号: 10, 页码: -
作者:
Yan, Yan
;
Herman, Eyeleko Anselme
;
Mahmood, Adnan
;
Feng, Tao
;
Xie, Pengshou
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/03/12
Privacy by design
Publishing
Statistics
Clustering effect
Clustering process
Data release
Experimental analysis
Information loss
K-Anonymity
K-anonymization
Privacy Preserving Data Publishing
BacS: A blockchain-based access control scheme in distributed internet of things
期刊论文
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 页码: 15
作者:
Shi, Na
;
Tan, Liang
;
Yang, Ciaxia
;
He, Chen
;
Xu, Junli
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2020/12/10
Distributed IoT
Access control
Privacy preserving
Blockchain
Transaction
©版权所有 ©2017 CSpace - Powered by
CSpace