標題: Titlebook: Big Data and Security; Third International Yuan Tian,Tinghuai Ma,Zhaoqing Pan Conference proceedings 2022 Springer Nature Singapore Pte Lt [打印本頁] 作者: 呻吟 時間: 2025-3-21 19:21
書目名稱Big Data and Security影響因子(影響力)
書目名稱Big Data and Security影響因子(影響力)學科排名
書目名稱Big Data and Security網(wǎng)絡公開度
書目名稱Big Data and Security網(wǎng)絡公開度學科排名
書目名稱Big Data and Security被引頻次
書目名稱Big Data and Security被引頻次學科排名
書目名稱Big Data and Security年度引用
書目名稱Big Data and Security年度引用學科排名
書目名稱Big Data and Security讀者反饋
書目名稱Big Data and Security讀者反饋學科排名
作者: extemporaneous 時間: 2025-3-21 23:38
Research on Navigation Algorithm Model of Virtual Tourism System Based on GIS作者: 無孔 時間: 2025-3-22 03:47 作者: CESS 時間: 2025-3-22 06:33 作者: 并排上下 時間: 2025-3-22 12:02
Vehicle Road Privacy Recommendation System Equipped with Markov Chainerences. Then, according to the congestion degree of the road section, the sensitive circle range is defined for each query position of the recommended route, and the acceptable deviation range of the user virtual position is superimposed to protect the differential privacy. Experimental results sho作者: 歌曲 時間: 2025-3-22 14:43
Image Watermark Combining with Discrete Wavelet Transform and Singular Value Decompositionh 26.1793?dB and 0.8517, which has better robustness than the 8 existing watermarking algorithms. The comprehensive results indicate that the proposed algorithm can commendably balance the relationship among robustness, visual transparency and watermark embedding amount in the process of watermark e作者: 柳樹;枯黃 時間: 2025-3-22 17:58
Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBSy content preservation based on a fake query concept in which we conceal the user’s actual query among a set of queries. The results of several experiments with different conditions confirm that our proposed scheme can protect users’ trajectory privacy successfully in a trustworthy and efficient man作者: 損壞 時間: 2025-3-22 23:53 作者: contradict 時間: 2025-3-23 04:07
Design Guidance for?Lightweight Object Detection Modelsss. For the network structure, the width and depth of the network are adjusted, the amount of parameters of the model is compressed. The training process is divided into the first, middle and last three stages to improve the detection performance of the model without adding extra computation. Taking作者: athlete’s-foot 時間: 2025-3-23 06:52
Research on Blockchain Security Risk Analysis and Coping Strategiess the classification of attack methods on blockchain. Then, we summarized the defense strategies to deal with the above security issues and analyzed the shortcomings and problems. Finally, based on the current research status of blockchain, we point out two future research directions.作者: Lime石灰 時間: 2025-3-23 12:29 作者: 抗原 時間: 2025-3-23 15:44
Springer Texts in Business and Economicsummarize how existing works apply differential privacy to deep learning, we divide perturbations into four categories based on different perturbation stages of deep learning with differential privacy: input perturbation, parameter perturbation, objective function perturbation, and output perturbatio作者: 紅潤 時間: 2025-3-23 20:05 作者: Indelible 時間: 2025-3-23 23:24
https://doi.org/10.1007/978-3-031-27196-0h 26.1793?dB and 0.8517, which has better robustness than the 8 existing watermarking algorithms. The comprehensive results indicate that the proposed algorithm can commendably balance the relationship among robustness, visual transparency and watermark embedding amount in the process of watermark e作者: minaret 時間: 2025-3-24 04:57 作者: 評論者 時間: 2025-3-24 06:59
From Congruent Numbers to Elliptic Curves,ning based on crowd search algorithm, and understands financial risk analysis and early warning and related theories of crowd search algorithm on the basis of literature data, and then analyzes the financial risk analysis and early warning system of memory crowd search algorithm is designed and test作者: 捕鯨魚叉 時間: 2025-3-24 11:36
https://doi.org/10.1007/978-1-4684-0255-1ss. For the network structure, the width and depth of the network are adjusted, the amount of parameters of the model is compressed. The training process is divided into the first, middle and last three stages to improve the detection performance of the model without adding extra computation. Taking作者: 灌輸 時間: 2025-3-24 15:39 作者: 南極 時間: 2025-3-24 19:46
Marketing and Advertising in E-Commercewarning system based on the improved K-means clustering algorithm solves the problems existing in the traditional security system, which can largely avoid the problem of system omission and false alarm, and the overall performance of the power security early warning system has been greatly improved.作者: infringe 時間: 2025-3-25 00:50
https://doi.org/10.1007/978-3-031-27196-0protecting techniques in the process of delivering and end-uses of smart meter data application according to the flowing direction of smart meter data. Compared with other review papers, we analyze the merits and drawbacks in corresponding situations and provide readers a more detailed eyesight to the research status in modern smart grid.作者: Delude 時間: 2025-3-25 07:02
Research on Power Security Early Warning System Based on Improved K-means Algorithmwarning system based on the improved K-means clustering algorithm solves the problems existing in the traditional security system, which can largely avoid the problem of system omission and false alarm, and the overall performance of the power security early warning system has been greatly improved.作者: CUR 時間: 2025-3-25 07:50 作者: 保存 時間: 2025-3-25 13:08 作者: Mirage 時間: 2025-3-25 19:21 作者: motivate 時間: 2025-3-25 20:13
https://doi.org/10.1007/978-3-030-81772-5rs, people study new traceable attribute based encryption schemes, supporting tracing key holders. This article analyzes the strengths and weaknesses of traceable attribute base encryption schemes from various aspects and looks into the future research.作者: phase-2-enzyme 時間: 2025-3-26 02:54 作者: 織物 時間: 2025-3-26 07:58 作者: diabetes 時間: 2025-3-26 09:41
Research on Identification Method of Sensitive Data in Power Systemcess of sensitive data in power system. The architecture and functional composition of sensitive data identification system for power system are proposed. Finally, the implementation process of sensitive data protection is given.作者: 不要嚴酷 時間: 2025-3-26 14:01 作者: Wernickes-area 時間: 2025-3-26 20:15 作者: probate 時間: 2025-3-26 21:35 作者: Jogging 時間: 2025-3-27 02:27
Business-to-Business E-Commercecess of sensitive data in power system. The architecture and functional composition of sensitive data identification system for power system are proposed. Finally, the implementation process of sensitive data protection is given.作者: Calibrate 時間: 2025-3-27 06:23 作者: CAJ 時間: 2025-3-27 13:06
Other Important Materials for Electronics,ous existing out-sourced PSI protocols, including verifiable PSI, multi-party PSI, PSI-CA, quantum-based PSI, post-quantum-based PSI, fog-based PSI, blockchain-based PSI, attribute-based PSI, etc. Through the comparative analysis and summary of the existing schemes, we further discussed the future research direction.作者: FOLLY 時間: 2025-3-27 16:20 作者: Limousine 時間: 2025-3-27 19:42 作者: enchant 時間: 2025-3-28 00:15
Application of Digital Twin in the Security Protection of the Internet of Things in Power System Finally, the application status and prospects of PSDT in many fields of power systems are clarified. The research results of this paper promote the development of dt technology and the application of data science in engineering.作者: 歹徒 時間: 2025-3-28 06:02
Privacy Preserving Facial Image Processing Method Using Variational Autoencoderbuse of facial images become more serious. The existing simple face de-identification methods like occlusion or blurring seriously damage the useful information and structure of image, which leads to a poor visual effect and is of little significant in practical application. In this work, we propose作者: resuscitation 時間: 2025-3-28 07:44
A Survey on?Privacy-Preserving Deep Learning with?Differential Privacyded to train a deep learning model. The data might contain sensitive information, leading to the risk of privacy leakage in the process of model training and model application. As a privacy definition with strict mathematical guarantee, differential privacy has gained great attention and has been wi作者: 未完成 時間: 2025-3-28 14:19
Research on Security Protection Model of Power Big Data power system. In the current big data environment, the study of power system security has important practical value. On account of this, this paper first analyses the data security situation and response of power system, then studies the power data security protection system and power big data secu作者: farewell 時間: 2025-3-28 15:22 作者: Felicitous 時間: 2025-3-28 22:21 作者: Esophagus 時間: 2025-3-29 00:19 作者: 挫敗 時間: 2025-3-29 03:33 作者: 整頓 時間: 2025-3-29 07:27
Recent Advances in Smart Meter: Data Analysis, Privacy Preservation and Applicationsrowing demand for higher quality service and take up the emergence of new challenges. How to analyze, transmit and make the most of massive smart meter data to enhance the efficiency and reliability is our priority. The purpose of this paper is to conduct a detailed review to summarize and evaluate 作者: chandel 時間: 2025-3-29 14:14 作者: 雀斑 時間: 2025-3-29 18:11 作者: 蛤肉 時間: 2025-3-29 22:59 作者: bypass 時間: 2025-3-30 01:28
Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBSt concern. When users utilize LBSs, their location and trajectory information may expose their identities in continuous LBSs. Using the spatial and temporal correspondences on users’ trajectories, adversaries can easily gather their private information. Using collaboration between users instead of l作者: mettlesome 時間: 2025-3-30 06:50 作者: 大溝 時間: 2025-3-30 11:16 作者: 凹室 時間: 2025-3-30 14:38 作者: grounded 時間: 2025-3-30 18:59 作者: encyclopedia 時間: 2025-3-30 22:35
Business-to-Business E-Commercebuse of facial images become more serious. The existing simple face de-identification methods like occlusion or blurring seriously damage the useful information and structure of image, which leads to a poor visual effect and is of little significant in practical application. In this work, we propose作者: GIDDY 時間: 2025-3-31 01:37 作者: 顯微鏡 時間: 2025-3-31 05:14
Marketing and Advertising in E-Commerce power system. In the current big data environment, the study of power system security has important practical value. On account of this, this paper first analyses the data security situation and response of power system, then studies the power data security protection system and power big data secu作者: Digitalis 時間: 2025-3-31 13:08 作者: 牽索 時間: 2025-3-31 13:59 作者: 大炮 時間: 2025-3-31 19:24 作者: Jocose 時間: 2025-3-31 22:41
Mobile Commerce and the Internet of Thingseat and destruction. It is necessary to further strengthen the protection of data privacy in the system, so as to effectively ensure the healthy and stable operation of the power ICS. On account of this, this paper first analyses the necessity of data privacy protection of power ICS, then studies th作者: 性學院 時間: 2025-4-1 03:22 作者: arbiter 時間: 2025-4-1 07:14
https://doi.org/10.1007/978-3-031-27196-0 image watermarking algorithm is proposed, which combined with the contrast sensitivity characteristics of human visual system (HVS). In the algorithm, the scrambled watermark is embedded into the singular value matrix of image with some intensity, and its inverse process is used to extract the wate作者: enormous 時間: 2025-4-1 13:18 作者: GUMP 時間: 2025-4-1 16:10
https://doi.org/10.1007/978-3-030-81772-5ty of users can share the decryption key, the attribute of traditional encryption mechanism cannot track leaking key malicious users, so in recent years, people study new traceable attribute based encryption schemes, supporting tracing key holders. This article analyzes the strengths and weaknesses 作者: Liability 時間: 2025-4-1 21:08
Self-consistent-field (SCF)-methods,t concern. When users utilize LBSs, their location and trajectory information may expose their identities in continuous LBSs. Using the spatial and temporal correspondences on users’ trajectories, adversaries can easily gather their private information. Using collaboration between users instead of l作者: Musket 時間: 2025-4-2 01:22 作者: HUSH 時間: 2025-4-2 05:43 作者: Cytology 時間: 2025-4-2 08:46
https://doi.org/10.1007/978-1-4684-0255-1 effective use of data flow, with virtual deduction means, combined with real-time situation perception, to get a full understanding of the power system, and then can play an auxiliary role in the formulation of regulatory decisions. Different from the current simulation software, PSDT has the featu作者: FILTH 時間: 2025-4-2 12:15
https://doi.org/10.1007/978-1-84882-016-6 is still in its infancy. This paper first reviews the basic technology and development of blockchain, summarized and introduced the blockchain structure. In terms of blockchain security, we analyze and summarizes the domestic and foreign literatures in recent years, and divide blockchain security i