×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [37]
内容类型
期刊论文 [28]
会议论文 [8]
学位论文 [1]
发表日期
2022 [9]
2021 [5]
2020 [7]
2019 [4]
2018 [4]
2017 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共37条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
A location privacy protection method based on cipher-text retrieval in cloud environment
期刊论文
SECURITY AND PRIVACY, 2022
作者:
Zhang, Yongbing
;
Zhang, Qiuyu
;
Jiang, Yilong
;
Yan, Yan
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2022/07/19
cipher-text retrieval
location privacy protection
location-based service
Morton code
top-k sorting
Achieving Differential Privacy Publishing of Location-Based Statistical Data Using Grid Clustering
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2022, 卷号: 11, 期号: 7
作者:
Yan, Yan
;
Sun, Zichao
;
Mahmood, Adnan
;
Xu, Fei
;
Dong, Zhuoyue
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/08/09
statistical release of big data
location privacy
differential privacy
privacy spatial decomposition
grid clustering
A differentially private nonnegative matrix factorization for recommender system
期刊论文
Information Sciences, 2022, 卷号: 592, 页码: 21-35
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2022/04/21
Benchmarking
Collaborative filtering
Economic and social effects
Information services
Large dataset
Matrix algebra
Matrix factorization
Privacy-preserving techniques
Differential privacies
Factorization methods
Filtering problems
Imputation
Non-negativity
Nonnegative matrix factorization
Objective functions
Personalized information services
Polynomial expression
User data
A differentially private matrix factorization based on vector perturbation for recommender system
期刊论文
Neurocomputing, 2022, 卷号: 483, 页码: 32-41
作者:
Ran, Xun
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2022/04/21
Benchmarking
Data privacy
Matrix algebra
Matrix factorization
Sensitivity analysis
Differential privacies
Error accumulation
Factorization techniques
Matrix factorizations
Multiple iterations
Objective functions
Privacy preservation
Privacy protection
User data
Vector perturbation
高效抗合谋攻击分布式机器学习隐私保护方案
期刊论文
华中科技大学学报(自然科学版), 2022, 卷号: 50, 期号: 5, 页码: 1-7
作者:
曹来成
;
吴琪瑞
;
吴蓉
;
郭显
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2022/04/21
机器学习
分布式系统
抗合谋攻击
云存储
差分隐私
Statistics release and privacy protection method of location big data based on deep learning
期刊论文
Tongxin Xuebao/Journal on Communications, 2022, 卷号: 43, 期号: 1, 页码: 203-216
作者:
Yan, Yan
;
Cong, Yiming
;
Mahmood, Adnan
;
Sheng, Quanzheng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/21
Big data
Budget control
Data privacy
Deep learning
Efficiency
Forecasting
Publishing
Data publishing
Deep learning
Differential privacies
Location privacy
Partition structures
Privacy protection
Privacy protection data publishing
Private spatial decomposition
Protection methods
Spatial decompositions
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
BCP-based joint delegation learning model and protocol
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 5, 页码: 137-148
作者:
Gao, Sheng
;
Xiang, Kang
;
Tian, Youliang
;
Tan, Weijie
;
Feng, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/02/17
Crime
Cryptography
Data mining
Decision trees
Privacy by design
Random forests
Data mining process
Decision tree modeling
Entropy algorithms
Ho-momorphic encryptions
Horizontal distribution
Model construction
Performance analysis
Privacy protection
©版权所有 ©2017 CSpace - Powered by
CSpace