×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [8]
自动化研究所 [7]
数学与系统科学研究院 [2]
沈阳自动化研究所 [1]
内容类型
期刊论文 [16]
会议论文 [2]
发表日期
2022 [18]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共18条,第1-10条
帮助
限定条件
发表日期:2022
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A survey on federated learning: challenges and applications
期刊论文
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2022, 页码: 23
作者:
Wen, Jie
;
Zhang, Zhixia
;
Lan, Yang
;
Cui, Zhihua
;
Cai, Jianghui
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/12/27
Federated learning
Machine learning
Privacy protection
Personalized federated learning
IrisGuard: Image Forgery Detection for Iris Anti-spoofing
会议论文
Beijing, 2022.12.11-2022.12.13
作者:
Zhuo, Wenqi
;
Wang, Wei
;
Zhang, Hui
;
Dong, Jing
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/05/31
iris anti-spoofing
image forgery detection
privacy protection
Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 11
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Mao, Wenji
;
Zeng, Daniel Dajun
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/11/14
Perturbation methods
Semantics
Computational modeling
Codes
Task analysis
Privacy
Software
Adversarial perturbation
deep neural network (DNN)
privacy protection
semantic retrieval
Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model
期刊论文
Sensors, 2022, 卷号: 22, 期号: 15
作者:
Cao, Laicheng
;
Zhu, Min
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/09/22
Energy efficiency
Pollution
Privacy-preserving techniques
Camouflage attack
Effective trust cluster formulation scheme
Fuzzy trusts
Game models
Low consumption
Low-high
Optimal cluster
Pollution attack
Privacy preserving
Repeated games
Differentially private distributed algorithms for stochastic aggregative games
期刊论文
AUTOMATICA, 2022, 卷号: 142, 页码: 13
作者:
Wang, Jimin
;
Zhang, Ji-Feng
;
He, Xingkang
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2023/02/07
Differential privacy
Stochastic aggregative games
Distributed algorithms
Stochastic approximation
Differentially private resilient distributed cooperative online estimation over digraphs
期刊论文
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 页码: 19
作者:
Wang, Jimin
;
Zhang, Ji-Feng
;
Liu, Xiao-Kang
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/02/07
differential privacy
distributed online estimation
resilient estimation
stochastic approximation
A location privacy protection method based on cipher-text retrieval in cloud environment
期刊论文
SECURITY AND PRIVACY, 2022
作者:
Zhang, Yongbing
;
Zhang, Qiuyu
;
Jiang, Yilong
;
Yan, Yan
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/07/19
cipher-text retrieval
location privacy protection
location-based service
Morton code
top-k sorting
Achieving Differential Privacy Publishing of Location-Based Statistical Data Using Grid Clustering
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2022, 卷号: 11, 期号: 7
作者:
Yan, Yan
;
Sun, Zichao
;
Mahmood, Adnan
;
Xu, Fei
;
Dong, Zhuoyue
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2022/08/09
statistical release of big data
location privacy
differential privacy
privacy spatial decomposition
grid clustering
A differentially private nonnegative matrix factorization for recommender system
期刊论文
Information Sciences, 2022, 卷号: 592, 页码: 21-35
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2022/04/21
Benchmarking
Collaborative filtering
Economic and social effects
Information services
Large dataset
Matrix algebra
Matrix factorization
Privacy-preserving techniques
Differential privacies
Factorization methods
Filtering problems
Imputation
Non-negativity
Nonnegative matrix factorization
Objective functions
Personalized information services
Polynomial expression
User data
A differentially private matrix factorization based on vector perturbation for recommender system
期刊论文
Neurocomputing, 2022, 卷号: 483, 页码: 32-41
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2022/04/21
Benchmarking
Data privacy
Matrix algebra
Matrix factorization
Sensitivity analysis
Differential privacies
Error accumulation
Factorization techniques
Matrix factorizations
Multiple iterations
Objective functions
Privacy preservation
Privacy protection
User data
Vector perturbation
©版权所有 ©2017 CSpace - Powered by
CSpace