標(biāo)題: Titlebook: Security and Privacy in Digital Economy; First International Shui Yu,Peter Mueller,Jiangbo Qian Conference proceedings 2020 Springer Natur [打印本頁] 作者: 連結(jié) 時(shí)間: 2025-3-21 19:41
書目名稱Security and Privacy in Digital Economy影響因子(影響力)
書目名稱Security and Privacy in Digital Economy影響因子(影響力)學(xué)科排名
書目名稱Security and Privacy in Digital Economy網(wǎng)絡(luò)公開度
書目名稱Security and Privacy in Digital Economy網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Security and Privacy in Digital Economy被引頻次
書目名稱Security and Privacy in Digital Economy被引頻次學(xué)科排名
書目名稱Security and Privacy in Digital Economy年度引用
書目名稱Security and Privacy in Digital Economy年度引用學(xué)科排名
書目名稱Security and Privacy in Digital Economy讀者反饋
書目名稱Security and Privacy in Digital Economy讀者反饋學(xué)科排名
作者: Maximize 時(shí)間: 2025-3-21 20:21
uation to obtain the future population. For Problem two, we do a sensitivity test on the bee population. We applied the Random Forest model here to determine the importance of each variable. During the evaluation of the model, we test four sets of data and compare the Random Forest results with the 作者: 情感脆弱 時(shí)間: 2025-3-22 03:39 作者: Irritate 時(shí)間: 2025-3-22 05:46 作者: Noisome 時(shí)間: 2025-3-22 10:21
Hongqing Huang,Lin Zhang attacks from the past and provides a general methodology for analyzing printer security. Our methodology will be used to conduct online surveys of experienced IT practitioners to explore their exposure to social engineering attacks and security concerns related to printers, digital copiers, and 3D 作者: 障礙物 時(shí)間: 2025-3-22 15:27 作者: 猜忌 時(shí)間: 2025-3-22 18:11 作者: 前兆 時(shí)間: 2025-3-22 21:20
Jiahua Zhu,Xianliang Jiang,Guang Jin,Penghui Lie Pearson correlation test, EG two-step cointegration analysis, Granger causality analysis and other methods are used in the empirical research of the DE on the EG of the Asia-Pacific region. The research results show that the DE accounts for an increasing proportion of each country. The absolute va作者: STEER 時(shí)間: 2025-3-23 02:41 作者: 背書 時(shí)間: 2025-3-23 06:49
Kun Li,Huachun Zhou,Zhe Tu,Bohao Fenglication scenarios of BC technology, and explains the working principle of BC technology used in agricultural economic management shows the characteristics and advantages of decentralized management. This article is aimed at the problems of data sharing in the economic network, combined with the sca作者: 令人心醉 時(shí)間: 2025-3-23 11:13
Gongxuan Zhang,Mingyue Zhang,Xinyi Fanor to select the optimal feature vectors. At last, deep convolutional neural network (DCNN) was applied to classify the person’s facial image. The experimental result proves that the proposed model improved recognition accuracy up to 1.78–8.90% compared to the earlier research works such as improved作者: Bricklayer 時(shí)間: 2025-3-23 15:44 作者: 抵消 時(shí)間: 2025-3-23 19:54
Hongbin Fan,Yining Liu,Zhixin Zengrough his speech. Mainly, secret commands are used for the interaction with the middleware. Raspberry Pi is the backbone of the system. It operates as a middleware, in the system architecture. Wireless nodes used in this system are called as Node MCU, and this Node MCU is placed in each classroom. A作者: Iniquitous 時(shí)間: 2025-3-23 23:24
Xianjin Fang,Qingkui Zeng,Gaoming Yang have discovered restricted proof for a relationship between specialist emotional intelligence (EI) and the patient-doctor relationship (PDR). Constant improvements in management of OPD through new policies are essential for better patient management and for proper utilization of skill, expertise, a作者: 顛簸下上 時(shí)間: 2025-3-24 04:32
Datong Wu,Xiaotong Wu,Jiaquan Gao,Genlin Ji,Xiaolong Xu,Lianyong Qi,Wanchun Douoposed for MANETs. This paper mainly focuses on designing and developing a Machine Learning-based model using the K-means clustering method that classifies the congestion into fewer nodes for packet transmission by considering the QoS parameters such as bandwidth, delay, throughput, packet delivery 作者: Cerumen 時(shí)間: 2025-3-24 07:57 作者: Wallow 時(shí)間: 2025-3-24 12:34
Feng Wusing RPL and identify the principal features affecting the network lifetime. The network setup is simulated using the Cooja simulator, a dataset is created with multiple network parameters and consequently, the features are selected using the Machine Learning (ML) technique. It is inferred from the 作者: 滑稽 時(shí)間: 2025-3-24 17:19
Datong Wu,Xiaotong Wu,Jiaquan Gao,Genlin Ji,Taotao Wu,Xuyun Zhang,Wanchun Doued for the classification of television advertising ratings. The results of this study can provide one of the options for advertising companies to provide offers related to the prediction of television ratings to advertisers as one of the considerations in choosing a television station.作者: BOOST 時(shí)間: 2025-3-24 21:27 作者: 單色 時(shí)間: 2025-3-24 23:24
Ying Zhao,Junjun Chen,Qianling Guo,Jian Teng,Di Wu analysis shows that there is a direct relationship between the mediating variables supply chain dynamism and supply chain resilience and supply chain performance. These results provide an insight into the relationship between artificial intelligence and supply chains, and the Moderating variable on作者: cravat 時(shí)間: 2025-3-25 03:31 作者: 清楚說話 時(shí)間: 2025-3-25 11:04
CaaS: Enabling Congestion Control as a Service to Optimize WAN Data Transfer network condition, or if there are better schemes for use. To tackle above issues, we articulate a vision of providing congestion control as a service to enable: (i) timely deployment of novel congestion control algorithms, (ii) dynamical adaption of congestion control algorithm according to the ne作者: 輕而薄 時(shí)間: 2025-3-25 15:30 作者: 輕浮思想 時(shí)間: 2025-3-25 16:17 作者: Allure 時(shí)間: 2025-3-25 23:28
Location-Aware Privacy Preserving Scheme in SDN-Enabled Fog Computingshing the first scheme by clustering fog nodes with SDN-enabled fog computing. In addition, we customize .-differential privacy preservation scheme to tailor-made for the variant fog computing services. Furthermore, we employ a modified Laplacian mechanism to generate noise, with which we find the o作者: Exposure 時(shí)間: 2025-3-26 03:13
PLFG: A Privacy Attack Method Based on Gradients for Federated Learningprivacy can be disclosed, and current popular defense (gradient noise addition and gradient compression) cannot defend effectively. Furthermore, we discuss the limitations and feasible improvements of PLFG. We hope our attack can provide different ideas for future defense attempts to protect sensiti作者: Presbycusis 時(shí)間: 2025-3-26 04:45 作者: Scintigraphy 時(shí)間: 2025-3-26 09:50 作者: sinoatrial-node 時(shí)間: 2025-3-26 14:01 作者: 時(shí)間等 時(shí)間: 2025-3-26 17:26 作者: 皮薩 時(shí)間: 2025-3-27 01:01
Pu Zhao,Wentao Zhao,Qiang Liu,Anbang Wangime and population, establishing a time–population model for bees. However, this method fails to provide a precise enough result. For improvement, the analysis of bee populations is augmented with more comprehensive factors (both positive and negative), creating a unified measure to calculate the to作者: MILL 時(shí)間: 2025-3-27 05:07 作者: 事與愿違 時(shí)間: 2025-3-27 05:51
Yifang Zhi,Li Yang,Gaolei Yang,Yuehong Zhang the face of the increasing complexity of higher vocational college management, the traditional way of data statistics and text recording can not meet the needs of the current situation, the introduction of information technology, automation, intelligent scientific management means and methods is th作者: 常到 時(shí)間: 2025-3-27 11:34 作者: 脖子 時(shí)間: 2025-3-27 14:57 作者: 無脊椎 時(shí)間: 2025-3-27 18:39
Shuaishuai Zhu,Yiliang Han,Xiaoyuan Yang,Xuguang WuIn the country, affected by the dividend of my country’s population base, the development of the DE is also very rapid. This article takes China, Japan, South Korea, Brunei, and Cambodia in the Asia-Pacific region as the analysis objects to explore the impact of the DE on national economic growth (E作者: FLOUR 時(shí)間: 2025-3-28 00:01 作者: Benign 時(shí)間: 2025-3-28 04:37 作者: 誓言 時(shí)間: 2025-3-28 09:06
ional communication alternative in our country. Recently, the integration of deep learning with convolution neural network plays a major role in solving various image classification problems. The proposed deep convolution neural network model is prepared with six convolution layers and three fully c作者: 打擊 時(shí)間: 2025-3-28 11:29 作者: 起來了 時(shí)間: 2025-3-28 17:05 作者: APNEA 時(shí)間: 2025-3-28 21:00
Datong Wu,Xiaotong Wu,Jiaquan Gao,Genlin Ji,Xiaolong Xu,Lianyong Qi,Wanchun Douutonomous and configured its own nodes. The node is used to send, receive, and transmit the information from source to destination using the telecommunication system. In wireless communication, nodes move randomly and adapt themselves to any environment without any fixed infrastructure or centralize作者: Cholesterol 時(shí)間: 2025-3-29 01:53 作者: 瘙癢 時(shí)間: 2025-3-29 06:27 作者: 貪婪性 時(shí)間: 2025-3-29 08:18
Datong Wu,Xiaotong Wu,Jiaquan Gao,Genlin Ji,Taotao Wu,Xuyun Zhang,Wanchun Doun is the rating of the programs on the television. This parameter is also the consideration of advertisers in choosing a television station. For companies engaged in the advertising industry generally will provide offers to prospective customers using historical data related to ratings that have bee作者: 使隔離 時(shí)間: 2025-3-29 12:06 作者: Simulate 時(shí)間: 2025-3-29 18:10 作者: eczema 時(shí)間: 2025-3-29 20:07
Improvements Based on JWT and RBAC for Spring Security Framework mechanism and some improvements and optimizations based on JSON Web Token and RBAC model. Furthermore, a trust RBAC model is proposed, and we expounded its structure from direct trust and indirect trust. The simulation results show that the method we proposed has a good effect.作者: 使顯得不重要 時(shí)間: 2025-3-30 01:40 作者: 強(qiáng)化 時(shí)間: 2025-3-30 05:33
Security and Privacy in Digital Economy978-981-15-9129-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: VEN 時(shí)間: 2025-3-30 10:37
Communications in Computer and Information Sciencehttp://image.papertrans.cn/s/image/863508.jpg作者: airborne 時(shí)間: 2025-3-30 13:42 作者: 看法等 時(shí)間: 2025-3-30 18:46 作者: Exploit 時(shí)間: 2025-3-30 23:29 作者: Euthyroid 時(shí)間: 2025-3-31 01:17
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4ta plane. Moreover, we implement the prototype of our scheme and extensive experiments to show that the proposed scheme can prevent malicious flow entries from damaging the packet forwarding of the data plane with trivial overheads.作者: ELATE 時(shí)間: 2025-3-31 08:31
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Lear a shared key based on a deep paired decoder. For any passive adversary, the KRM is forward provable secure under the linear decoding hardness assumption. Compared with existing schemes, the performance evaluation showed our KRM is practical and quite efficient in communication and time costs, especially in multi-party scenarios.作者: 陳舊 時(shí)間: 2025-3-31 12:56
A Personalized Preservation Mechanism Satisfying Local Differential Privacy in Location-Based Servicefinition with LDP and users’ personalized requirements. We propose a personalized location privacy preservation mechanism for spatial data satisfying LDP. We demonstrate the optimal utility and privacy guarantee of our mechanism. We analyze the impact of the key parameters on data utility via the experiments over the real dataset.作者: 忘川河 時(shí)間: 2025-3-31 16:27 作者: 下級(jí) 時(shí)間: 2025-3-31 20:55