×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [15]
自动化研究所 [12]
清华大学 [6]
兰州理工大学 [6]
软件研究所 [6]
深圳先进技术研究院 [5]
更多...
内容类型
期刊论文 [42]
会议论文 [19]
其他 [8]
学位论文 [3]
发表日期
2023 [3]
2022 [4]
2021 [4]
2020 [3]
2018 [7]
2017 [4]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共72条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Mobility 5.0: Smart Logistics and Transportation Services in Cyber-Physical-Social Systems
期刊论文
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2023, 卷号: 8, 期号: 6, 页码: 3527-3532
作者:
Lin, Yilun
;
Na, Xiaoxiang
;
Wang, Ding
;
Dai, Xingyuan
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/11/17
Mobility
logistics
transportation
cyber-physical-social systems
Survey on AI and Machine Learning Techniques for Microgrid Energy Management Systems
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 7, 页码: 1513-1529
作者:
Aditya Joshi
;
Skieler Capezza
;
Ahmad Alhaji
;
Mo-Yuen Chow
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2023/06/14
Consensus
energy management system (EMS)
reinforcement learning
supervised learning
OTB-morph: One-time Biometrics via Morphing
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 6, 页码: 855-871
作者:
Mahdi Ghafourian, Julian Fierrez, Ruben Vera-Rodriguez, Aythami Morales, Ignacio Serna
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/11/29
Biometrics, face recognition, template protection, morphing, security
Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model
期刊论文
Sensors, 2022, 卷号: 22, 期号: 15
作者:
Cao, Laicheng
;
Zhu, Min
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2022/09/22
Energy efficiency
Pollution
Privacy-preserving techniques
Camouflage attack
Effective trust cluster formulation scheme
Fuzzy trusts
Game models
Low consumption
Low-high
Optimal cluster
Pollution attack
Privacy preserving
Repeated games
Differentially Private Federated Learning with Local Regularization and Sparsification
会议论文
线上, 2022-6
作者:
Cheng AD(程安达)
;
Wang PS(王培松)
;
Zhang X(张希)
;
Cheng J(程健)
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/06/05
A differentially private nonnegative matrix factorization for recommender system
期刊论文
Information Sciences, 2022, 卷号: 592, 页码: 21-35
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/04/21
Benchmarking
Collaborative filtering
Economic and social effects
Information services
Large dataset
Matrix algebra
Matrix factorization
Privacy-preserving techniques
Differential privacies
Factorization methods
Filtering problems
Imputation
Non-negativity
Nonnegative matrix factorization
Objective functions
Personalized information services
Polynomial expression
User data
A differentially private matrix factorization based on vector perturbation for recommender system
期刊论文
Neurocomputing, 2022, 卷号: 483, 页码: 32-41
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2022/04/21
Benchmarking
Data privacy
Matrix algebra
Matrix factorization
Sensitivity analysis
Differential privacies
Error accumulation
Factorization techniques
Matrix factorizations
Multiple iterations
Objective functions
Privacy preservation
Privacy protection
User data
Vector perturbation
Deep Learning for Mobile Mental Health: Challenges and recent advances
期刊论文
IEEE SIGNAL PROCESSING MAGAZINE, 2021, 卷号: 38, 期号: 6, 页码: 96-105
作者:
Han, Jing
;
Zhang, Zixing
;
Mascolo, Cecilia
;
Andre, Elisabeth
;
Tao, Jianhua
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2021/12/28
epsilon-k anonymization and adversarial training of graph neural networks for privacy preservation in social networks
期刊论文
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2021, 卷号: 50, 页码: 17
作者:
Tian, Hu
;
Zheng, Xiaolong
;
Zhang, Xingwei
;
Zeng, Daniel Dajun
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2021/12/28
Privacy preservation
Anonymization
Graph neural networks
Social network
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 12, 页码: 1-21
作者:
Aldabbagh, G (Aldabbagh, Ghadah)[ 1 ]
;
Alghazzawi, DM (Alghazzawi, Daniyal M.)[ 1 ]
;
Hasan, SH (Hasan, Syed Hamid)[ 1 ]
;
Alhaddad, M (Alhaddad, Mohammed)[ 1 ]
;
Malibari, A (Malibari, Areej)[ 1 ]
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2021/07/14
mobile learningcloud storagehybrid optical elliptic curve cryptographyadaptive tunicate slime moldencryptiondecryptionsecurity
©版权所有 ©2017 CSpace - Powered by
CSpace