×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业技... [35]
西安交通大学 [24]
北京航空航天大学 [22]
厦门大学 [21]
兰州理工大学 [19]
山东大学 [12]
更多...
内容类型
期刊论文 [153]
会议论文 [49]
学位论文 [20]
其他 [4]
会议 [1]
发表日期
2023 [4]
2022 [9]
2021 [4]
2020 [6]
2019 [16]
2018 [32]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共227条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
FedFV: A Personalized Federated Learning Framework for Finger Vein Authentication
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 5, 页码: 683-696
作者:
Feng-Zhao Lian
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2023/09/25
Finger vein, personalized federated learning, privacy protection, biometric, authentication
Federated Learning with Privacy-preserving and Model IP-right-protection
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 1, 页码: 19-37
作者:
Qiang Yang
;
Anbu Huang
;
Lixin Fan
;
Chee Seng Chan
;
Jian Han Lim
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/04/23
Federated learning
privacy-preserving machine learning
security
decentralized learning
intellectual property protection
FedFV: A Personalized Federated Learning Framework for Finger Vein Authentication
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 5, 页码: 683-696
作者:
Feng-Zhao Lian
;
Jun-Duan Huang
;
Ji-Xin Liu
;
Guang Chen
;
Jun-Hong Zhao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/04/23
Finger vein, personalized federated learning, privacy protection, biometric, authentication
Federated Learning with Privacy-preserving and Model IP-right-protection
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 1, 页码: 19-37
作者:
Qiang Yang
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2023/01/18
Federated learning
privacy-preserving machine learning
security
decentralized learning
intellectual property protection
A survey on federated learning: challenges and applications
期刊论文
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2022, 页码: 23
作者:
Wen, Jie
;
Zhang, Zhixia
;
Lan, Yang
;
Cui, Zhihua
;
Cai, Jianghui
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/12/27
Federated learning
Machine learning
Privacy protection
Personalized federated learning
IrisGuard: Image Forgery Detection for Iris Anti-spoofing
会议论文
Beijing, 2022.12.11-2022.12.13
作者:
Zhuo, Wenqi
;
Wang, Wei
;
Zhang, Hui
;
Dong, Jing
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2023/05/31
iris anti-spoofing
image forgery detection
privacy protection
Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 11
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Mao, Wenji
;
Zeng, Daniel Dajun
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/11/14
Perturbation methods
Semantics
Computational modeling
Codes
Task analysis
Privacy
Software
Adversarial perturbation
deep neural network (DNN)
privacy protection
semantic retrieval
A location privacy protection method based on cipher-text retrieval in cloud environment
期刊论文
SECURITY AND PRIVACY, 2022
作者:
Zhang, Yongbing
;
Zhang, Qiuyu
;
Jiang, Yilong
;
Yan, Yan
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/07/19
cipher-text retrieval
location privacy protection
location-based service
Morton code
top-k sorting
A differentially private matrix factorization based on vector perturbation for recommender system
期刊论文
Neurocomputing, 2022, 卷号: 483, 页码: 32-41
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:46/0
  |  
提交时间:2022/04/21
Benchmarking
Data privacy
Matrix algebra
Matrix factorization
Sensitivity analysis
Differential privacies
Error accumulation
Factorization techniques
Matrix factorizations
Multiple iterations
Objective functions
Privacy preservation
Privacy protection
User data
Vector perturbation
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
©版权所有 ©2017 CSpace - Powered by
CSpace