×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海大学 [15]
内容类型
会议论文 [12]
期刊论文 [3]
发表日期
2018 [3]
2016 [1]
2015 [2]
2014 [2]
2013 [1]
2012 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
限定条件
专题:上海大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Privacy Preserving Framework for Worker
期刊论文
FUTURE INTERNET, 2018, 卷号: 10
作者:
Dai, Jiazhu[1]
;
Qiao, Keke[2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
spatial crowdsourcing
location privacy
local differential privacy
A Privacy Preserving Framework for Worker's Location in Spatial Crowdsourcing Based on Local Differential Privacy
期刊论文
FUTURE INTERNET, 2018, 卷号: 10
作者:
Dai, Jiazhu[1]
;
Qiao, Keke[2]
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/04/22
spatial crowdsourcing
location privacy
local differential privacy
TwinNet: A Double Sub-Network Framework for Detecting Universal Adversarial Perturbations
期刊论文
FUTURE INTERNET, 2018, 卷号: 10
作者:
Ruan, Yibin[1]
;
Dai, Jiazhu[2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
deep neural network
universal adversarial perturbation
double sub-network
detecting
PCA
ImageNet
An Optimized Privacy Inference Attack Based on Smartwatch Motion Sensors
会议论文
9th IEEE International Conference on Internet of Things, 12th IEEE International Conference on Green Computing and Communications, 9th IEEE International Conference on Cyber, Physical, and Social Computing and 2016 IEEE International Conference on Smart, 2016-12-16
作者:
Dai, Jiazhu[1]
;
Duan, Yitong[2]
;
Yang, Fenglei[3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/26
Context-based Monitor Framework for Sensors Access in Smartphone
会议论文
3rd IEEE International Conference on Progress in Informatcs and Computing (IEEE PIC), 2015-12-18
作者:
Dai, Jiazhu[1]
;
Chen, Junyan[2]
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/26
context-based access control
sensor
privacy
android
policies
A method for the trajectory privacy protection based on the segmented fake trajectory under road networks
会议论文
2nd International Conference on Information Science and Control Engineering, 2015-01-01
作者:
Dai, Jiazhu[1]
;
Hua, Liang[2]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/30
trajectory privacy
k-Anonymous
Segmented fake trajectory
Fake location
PLocShare: A privacy-preserving location sharing scheme in mobile social network
会议论文
2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014-05-08
作者:
Dai, Jiazhu[1]
;
Hua, Liang[2]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/30
Privacy
Location Sharing
Mobile Social Network
A Location Authentication Scheme Based On Adjacent Users
会议论文
PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014-01-01
作者:
Hua, Liang[1]
;
Dai, Jiazhu[2]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/30
Witness
Digital signature
Location authentication
A location authentication scheme based on proximity test of location tags
会议论文
2013 International Conference on Information and Network Security, ICINS 2013, 2013-11-22
作者:
Dai, Jiazhu[1]
;
Li, Zhilong[2]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/30
A Cryptographic and Time-Constraint Access Control Scheme for Mobile Terminals
会议论文
NETWORK COMPUTING AND INFORMATION SECURITY, 2012-12-07
作者:
Dai, Jiazhu[1]
;
Zhang, Chuan[2]
;
Li, Zhilong[3]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/30
security
encryption
sand box
hierarchical key assignment
©版权所有 ©2017 CSpace - Powered by
CSpace