派博傳思國際中心

標題: Titlebook: Big Data and Security; Third International Yuan Tian,Tinghuai Ma,Zhaoqing Pan Conference proceedings 2022 Springer Nature Singapore Pte Lt [打印本頁]

作者: 呻吟    時間: 2025-3-21 19:21
書目名稱Big Data and Security影響因子(影響力)




書目名稱Big Data and Security影響因子(影響力)學科排名




書目名稱Big Data and Security網(wǎng)絡公開度




書目名稱Big Data and Security網(wǎng)絡公開度學科排名




書目名稱Big Data and Security被引頻次




書目名稱Big Data and Security被引頻次學科排名




書目名稱Big Data and Security年度引用




書目名稱Big Data and Security年度引用學科排名




書目名稱Big Data and Security讀者反饋




書目名稱Big Data and Security讀者反饋學科排名





作者: extemporaneous    時間: 2025-3-21 23:38
Research on Navigation Algorithm Model of Virtual Tourism System Based on GIS
作者: 無孔    時間: 2025-3-22 03:47

作者: CESS    時間: 2025-3-22 06:33

作者: 并排上下    時間: 2025-3-22 12:02
Vehicle Road Privacy Recommendation System Equipped with Markov Chainerences. Then, according to the congestion degree of the road section, the sensitive circle range is defined for each query position of the recommended route, and the acceptable deviation range of the user virtual position is superimposed to protect the differential privacy. Experimental results sho
作者: 歌曲    時間: 2025-3-22 14:43
Image Watermark Combining with Discrete Wavelet Transform and Singular Value Decompositionh 26.1793?dB and 0.8517, which has better robustness than the 8 existing watermarking algorithms. The comprehensive results indicate that the proposed algorithm can commendably balance the relationship among robustness, visual transparency and watermark embedding amount in the process of watermark e
作者: 柳樹;枯黃    時間: 2025-3-22 17:58
Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBSy content preservation based on a fake query concept in which we conceal the user’s actual query among a set of queries. The results of several experiments with different conditions confirm that our proposed scheme can protect users’ trajectory privacy successfully in a trustworthy and efficient man
作者: 損壞    時間: 2025-3-22 23:53

作者: contradict    時間: 2025-3-23 04:07
Design Guidance for?Lightweight Object Detection Modelsss. For the network structure, the width and depth of the network are adjusted, the amount of parameters of the model is compressed. The training process is divided into the first, middle and last three stages to improve the detection performance of the model without adding extra computation. Taking
作者: athlete’s-foot    時間: 2025-3-23 06:52
Research on Blockchain Security Risk Analysis and Coping Strategiess the classification of attack methods on blockchain. Then, we summarized the defense strategies to deal with the above security issues and analyzed the shortcomings and problems. Finally, based on the current research status of blockchain, we point out two future research directions.
作者: Lime石灰    時間: 2025-3-23 12:29

作者: 抗原    時間: 2025-3-23 15:44
Springer Texts in Business and Economicsummarize how existing works apply differential privacy to deep learning, we divide perturbations into four categories based on different perturbation stages of deep learning with differential privacy: input perturbation, parameter perturbation, objective function perturbation, and output perturbatio
作者: 紅潤    時間: 2025-3-23 20:05

作者: Indelible    時間: 2025-3-23 23:24
https://doi.org/10.1007/978-3-031-27196-0h 26.1793?dB and 0.8517, which has better robustness than the 8 existing watermarking algorithms. The comprehensive results indicate that the proposed algorithm can commendably balance the relationship among robustness, visual transparency and watermark embedding amount in the process of watermark e
作者: minaret    時間: 2025-3-24 04:57

作者: 評論者    時間: 2025-3-24 06:59
From Congruent Numbers to Elliptic Curves,ning based on crowd search algorithm, and understands financial risk analysis and early warning and related theories of crowd search algorithm on the basis of literature data, and then analyzes the financial risk analysis and early warning system of memory crowd search algorithm is designed and test
作者: 捕鯨魚叉    時間: 2025-3-24 11:36
https://doi.org/10.1007/978-1-4684-0255-1ss. For the network structure, the width and depth of the network are adjusted, the amount of parameters of the model is compressed. The training process is divided into the first, middle and last three stages to improve the detection performance of the model without adding extra computation. Taking
作者: 灌輸    時間: 2025-3-24 15:39

作者: 南極    時間: 2025-3-24 19:46
Marketing and Advertising in E-Commercewarning system based on the improved K-means clustering algorithm solves the problems existing in the traditional security system, which can largely avoid the problem of system omission and false alarm, and the overall performance of the power security early warning system has been greatly improved.
作者: infringe    時間: 2025-3-25 00:50
https://doi.org/10.1007/978-3-031-27196-0protecting techniques in the process of delivering and end-uses of smart meter data application according to the flowing direction of smart meter data. Compared with other review papers, we analyze the merits and drawbacks in corresponding situations and provide readers a more detailed eyesight to the research status in modern smart grid.
作者: Delude    時間: 2025-3-25 07:02
Research on Power Security Early Warning System Based on Improved K-means Algorithmwarning system based on the improved K-means clustering algorithm solves the problems existing in the traditional security system, which can largely avoid the problem of system omission and false alarm, and the overall performance of the power security early warning system has been greatly improved.
作者: CUR    時間: 2025-3-25 07:50

作者: 保存    時間: 2025-3-25 13:08

作者: Mirage    時間: 2025-3-25 19:21

作者: motivate    時間: 2025-3-25 20:13
https://doi.org/10.1007/978-3-030-81772-5rs, people study new traceable attribute based encryption schemes, supporting tracing key holders. This article analyzes the strengths and weaknesses of traceable attribute base encryption schemes from various aspects and looks into the future research.
作者: phase-2-enzyme    時間: 2025-3-26 02:54

作者: 織物    時間: 2025-3-26 07:58

作者: diabetes    時間: 2025-3-26 09:41
Research on Identification Method of Sensitive Data in Power Systemcess of sensitive data in power system. The architecture and functional composition of sensitive data identification system for power system are proposed. Finally, the implementation process of sensitive data protection is given.
作者: 不要嚴酷    時間: 2025-3-26 14:01

作者: Wernickes-area    時間: 2025-3-26 20:15

作者: probate    時間: 2025-3-26 21:35

作者: Jogging    時間: 2025-3-27 02:27
Business-to-Business E-Commercecess of sensitive data in power system. The architecture and functional composition of sensitive data identification system for power system are proposed. Finally, the implementation process of sensitive data protection is given.
作者: Calibrate    時間: 2025-3-27 06:23

作者: CAJ    時間: 2025-3-27 13:06
Other Important Materials for Electronics,ous existing out-sourced PSI protocols, including verifiable PSI, multi-party PSI, PSI-CA, quantum-based PSI, post-quantum-based PSI, fog-based PSI, blockchain-based PSI, attribute-based PSI, etc. Through the comparative analysis and summary of the existing schemes, we further discussed the future research direction.
作者: FOLLY    時間: 2025-3-27 16:20

作者: Limousine    時間: 2025-3-27 19:42

作者: enchant    時間: 2025-3-28 00:15
Application of Digital Twin in the Security Protection of the Internet of Things in Power System Finally, the application status and prospects of PSDT in many fields of power systems are clarified. The research results of this paper promote the development of dt technology and the application of data science in engineering.
作者: 歹徒    時間: 2025-3-28 06:02
Privacy Preserving Facial Image Processing Method Using Variational Autoencoderbuse of facial images become more serious. The existing simple face de-identification methods like occlusion or blurring seriously damage the useful information and structure of image, which leads to a poor visual effect and is of little significant in practical application. In this work, we propose
作者: resuscitation    時間: 2025-3-28 07:44
A Survey on?Privacy-Preserving Deep Learning with?Differential Privacyded to train a deep learning model. The data might contain sensitive information, leading to the risk of privacy leakage in the process of model training and model application. As a privacy definition with strict mathematical guarantee, differential privacy has gained great attention and has been wi
作者: 未完成    時間: 2025-3-28 14:19
Research on Security Protection Model of Power Big Data power system. In the current big data environment, the study of power system security has important practical value. On account of this, this paper first analyses the data security situation and response of power system, then studies the power data security protection system and power big data secu
作者: farewell    時間: 2025-3-28 15:22

作者: Felicitous    時間: 2025-3-28 22:21

作者: Esophagus    時間: 2025-3-29 00:19

作者: 挫敗    時間: 2025-3-29 03:33

作者: 整頓    時間: 2025-3-29 07:27
Recent Advances in Smart Meter: Data Analysis, Privacy Preservation and Applicationsrowing demand for higher quality service and take up the emergence of new challenges. How to analyze, transmit and make the most of massive smart meter data to enhance the efficiency and reliability is our priority. The purpose of this paper is to conduct a detailed review to summarize and evaluate
作者: chandel    時間: 2025-3-29 14:14

作者: 雀斑    時間: 2025-3-29 18:11

作者: 蛤肉    時間: 2025-3-29 22:59

作者: bypass    時間: 2025-3-30 01:28
Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBSt concern. When users utilize LBSs, their location and trajectory information may expose their identities in continuous LBSs. Using the spatial and temporal correspondences on users’ trajectories, adversaries can easily gather their private information. Using collaboration between users instead of l
作者: mettlesome    時間: 2025-3-30 06:50

作者: 大溝    時間: 2025-3-30 11:16

作者: 凹室    時間: 2025-3-30 14:38

作者: grounded    時間: 2025-3-30 18:59

作者: encyclopedia    時間: 2025-3-30 22:35
Business-to-Business E-Commercebuse of facial images become more serious. The existing simple face de-identification methods like occlusion or blurring seriously damage the useful information and structure of image, which leads to a poor visual effect and is of little significant in practical application. In this work, we propose
作者: GIDDY    時間: 2025-3-31 01:37

作者: 顯微鏡    時間: 2025-3-31 05:14
Marketing and Advertising in E-Commerce power system. In the current big data environment, the study of power system security has important practical value. On account of this, this paper first analyses the data security situation and response of power system, then studies the power data security protection system and power big data secu
作者: Digitalis    時間: 2025-3-31 13:08

作者: 牽索    時間: 2025-3-31 13:59

作者: 大炮    時間: 2025-3-31 19:24

作者: Jocose    時間: 2025-3-31 22:41
Mobile Commerce and the Internet of Thingseat and destruction. It is necessary to further strengthen the protection of data privacy in the system, so as to effectively ensure the healthy and stable operation of the power ICS. On account of this, this paper first analyses the necessity of data privacy protection of power ICS, then studies th
作者: 性學院    時間: 2025-4-1 03:22

作者: arbiter    時間: 2025-4-1 07:14
https://doi.org/10.1007/978-3-031-27196-0 image watermarking algorithm is proposed, which combined with the contrast sensitivity characteristics of human visual system (HVS). In the algorithm, the scrambled watermark is embedded into the singular value matrix of image with some intensity, and its inverse process is used to extract the wate
作者: enormous    時間: 2025-4-1 13:18

作者: GUMP    時間: 2025-4-1 16:10
https://doi.org/10.1007/978-3-030-81772-5ty of users can share the decryption key, the attribute of traditional encryption mechanism cannot track leaking key malicious users, so in recent years, people study new traceable attribute based encryption schemes, supporting tracing key holders. This article analyzes the strengths and weaknesses
作者: Liability    時間: 2025-4-1 21:08
Self-consistent-field (SCF)-methods,t concern. When users utilize LBSs, their location and trajectory information may expose their identities in continuous LBSs. Using the spatial and temporal correspondences on users’ trajectories, adversaries can easily gather their private information. Using collaboration between users instead of l
作者: Musket    時間: 2025-4-2 01:22

作者: HUSH    時間: 2025-4-2 05:43

作者: Cytology    時間: 2025-4-2 08:46
https://doi.org/10.1007/978-1-4684-0255-1 effective use of data flow, with virtual deduction means, combined with real-time situation perception, to get a full understanding of the power system, and then can play an auxiliary role in the formulation of regulatory decisions. Different from the current simulation software, PSDT has the featu
作者: FILTH    時間: 2025-4-2 12:15
https://doi.org/10.1007/978-1-84882-016-6 is still in its infancy. This paper first reviews the basic technology and development of blockchain, summarized and introduced the blockchain structure. In terms of blockchain security, we analyze and summarizes the domestic and foreign literatures in recent years, and divide blockchain security i




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
泾源县| 克拉玛依市| 开鲁县| 中山市| 宣汉县| 长沙市| 海门市| 遵义市| 鲜城| 周口市| 齐河县| 亚东县| 元阳县| 牟定县| 宝丰县| 涡阳县| 安泽县| 辛集市| 临高县| 新余市| 孟村| 柳江县| 鲜城| 绍兴县| 达日县| 天全县| 巨鹿县| 龙江县| 吉木萨尔县| 仁布县| 宜兰市| 交口县| 湘潭县| 渝北区| 洱源县| 湛江市| 龙川县| 虞城县| 蓝山县| 湘阴县| 平度市|