咨询与建议

限定检索结果

文献类型

  • 35 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 42 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 38 篇 工学
    • 35 篇 计算机科学与技术...
    • 11 篇 信息与通信工程
    • 10 篇 电气工程
    • 7 篇 材料科学与工程(可...
    • 6 篇 仪器科学与技术
    • 6 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 软件工程
    • 2 篇 力学(可授工学、理...
    • 1 篇 交通运输工程
    • 1 篇 船舶与海洋工程
    • 1 篇 环境科学与工程(可...
  • 14 篇 理学
    • 12 篇 数学
    • 2 篇 系统科学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 4 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 医学
    • 3 篇 临床医学
    • 1 篇 基础医学(可授医学...
  • 2 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 42 篇 privacy preserva...
  • 4 篇 federated learni...
  • 4 篇 cloud computing
  • 3 篇 differential pri...
  • 3 篇 blockchain
  • 2 篇 k-anonymity
  • 2 篇 smart grid
  • 2 篇 adversarial lear...
  • 2 篇 data aggregation
  • 2 篇 machine learning
  • 2 篇 security
  • 2 篇 graph embedding
  • 2 篇 utility
  • 2 篇 cloud storage
  • 1 篇 internet of thin...
  • 1 篇 integrity of dat...
  • 1 篇 data utility
  • 1 篇 locality sensi-t...
  • 1 篇 data generation
  • 1 篇 reliability

机构

  • 1 篇 school of econom...
  • 1 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 college of crypt...
  • 1 篇 school of electr...
  • 1 篇 college of engin...
  • 1 篇 school of inform...
  • 1 篇 school of inform...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 vel-tech dr.rr&d...
  • 1 篇 school of inform...
  • 1 篇 beijing advanced...
  • 1 篇 school of inform...
  • 1 篇 ieee
  • 1 篇 school of inform...
  • 1 篇 school of comput...
  • 1 篇 school of inform...
  • 1 篇 the department o...
  • 1 篇 the cyber scienc...

作者

  • 2 篇 shui yu
  • 2 篇 youyang qu
  • 1 篇 zhongkui li
  • 1 篇 n.gomathi
  • 1 篇 510642 china 4 n...
  • 1 篇 cheng wang
  • 1 篇 xirui quan
  • 1 篇 xin zhao
  • 1 篇 jun zhang
  • 1 篇 haiping zhou
  • 1 篇 dong chen
  • 1 篇 abdul rehman jav...
  • 1 篇 jing yan
  • 1 篇 shigen shen
  • 1 篇 xiaoyang seanwan...
  • 1 篇 k.srinivasa redd...
  • 1 篇 kevin chiew
  • 1 篇 mengbiao huang
  • 1 篇 jingyi he
  • 1 篇 bowen zhao

语言

  • 36 篇 英文
  • 6 篇 中文
检索条件"主题词=Privacy preservation"
42 条 记 录,以下是1-10 订阅
排序:
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and privacy preservation in Fog-Enabled VANETs
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 3089-3110页
作者: Nagaraju Pacharla K.Srinivasa Reddy School of Computer Science and Engineering VIT-AP UniversityAmaravatiAndhra Pradesh522237India
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhanced Clustering Based OSN privacy preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced privacy Utility
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2171-2190页
作者: Rupali Gangarde Amit Sharma Ambika Pawar Department of CSE Lovely Professional UniversityPhagwara144411India Department of CSE Symbiosis Institute of Technology(SIT)Affiliated to Symbiosis International(Deemed University)Pune412115India School of Computer Applications Lovely Professional UniversityPhagwara144411India Learning&Development Persistent UniversityPersistent SystemsPune411057India
Online Social Networks (OSN) sites allow end-users to share agreat deal of information, which may also contain sensitive information,that may be subject to commercial or non-commercial privacy attacks. Asa result, gua... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4417-4452页
作者: Fauziyah Zhaoshun Wang Mujahid Tabassum School of Computer and Communication Engineering University of Science and TechnologyBeijing100000China Noroff School of Technology and Digital Media(Noroff Accelerate) Noroff University CollegeKristiansand4612Norway
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
2P3FL:A Novel Approach for privacy Preserving in Financial Sectors Using Flower Federated Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第8期140卷 2035-2051页
作者: Sandeep Dasari Rajesh Kaluri School of Computer Science Engineering and Information Systems Vellore Institute of TechnologyVellore632014India
The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Semi-Homogenous Generalization: Improving Homogenous Generalization for privacy preservation in Cloud Computing
收藏 引用
Journal of Computer Science & Technology 2016年 第6期31卷 1124-1135页
作者: Xian-Mang He Xiaoyang SeanWang Dong Li Yan-Ni Hao School of Information Science and Engineering Ningbo University Ningbo 315211 China School of Computer Science Fudan University Shanghai 200433 China Information Center National Natural Science Foundation of China Beijing 100085 China
Data security is one of the leading concerns and primary challenges for cloud computing. This issue is getting more and more serious with the development of cloud computing. However, the existing privacy-preserving da... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
EDA: an enhanced dual-active algorithm for location privacy preservation in mobile P2P networks
收藏 引用
Journal of Zhejiang University-Science C(Computers and Electronics) 2013年 第5期14卷 356-373页
作者: Yan-zhe CHE Kevin CHIEW Xiao-yan HONG Qiang YANG Qin-ming HE College of Computer Science and Technology Zhejiang University School of Engineering Tan Tao University Department of Computer Science University of Alabama College of Electrical Engineering Zhejiang University
Various solutions have been proposed to enable mobile users to access location-based services while preserving their location privacy. Some of these solutions are based on a centralized architecture with the participa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Implicit privacy preservation:a framework based on data generation
收藏 引用
Security and Safety 2022年 第1期1卷 166-183页
作者: Qing Yang Cheng Wang Teng Hu Xue Chen Changjun Jiang Key Laboratory of Embedded System and Service Computing(Tongji University) Ministry of EducationShanghai 201804China National(Province-Ministry Joint)Collaborative Innovation Center for Financial Network Security Tongji UniversityShanghai 201804China
This paper addresses a special and imperceptible class of privacy,called implicit privacy.In contrast to traditional(explicit)privacy,implicit privacy has two essential properties:(1)It is not initially de ned as a pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research of privacy preservation Method Based on Data Coloring
收藏 引用
China Communications 2016年 第10期13卷 181-197页
作者: Bilin Shao Genqing Bian Xirui Quan Zhixian Wang School of Management Xi'an University of Architecture and Technology School of Information and Control Engineering Xi'an University of Architecture and Technology School of Information Engineering Yulin University
In the cloud computing environment, outsourcing service mode of data storage causes the security problem, the reliability of data cannot be guaranteed, and the privacy preservation problem has aroused wide concern. In... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
ENHANCING privacy preservation FRAMEWORK IN DISTRIBUTED TRUST MODEL
ENHANCING PRIVACY PRESERVATION FRAMEWORK IN DISTRIBUTED TRUS...
收藏 引用
第八届分布式计算及其应用国际学术研讨会
作者: Yusheng Zhong1 Bo Yang 2 Mingwu Zhang 3 Wenzheng Zhang 4 123College of Informatics South China Agriculture UniversityGuangzhou Guangdong 510642 China 4 National Laboratory for Modern CommunicationsChengdu Sichuan 610041 China
Distributed trust management implements authorization, delegation,and access control with a decentralized and flexible manner.Credentials submitting and policies interacting will disclose owner’s sensitive attributes... 详细信息
来源: cnki会议 评论
privacy preservation of Smart Meters Based on Identity Authentication
Privacy Preservation of Smart Meters Based on Identity Authe...
收藏 引用
作者: Hongbo Hu Xin Zhao Yalian Wu Mengbiao Huang Ziqi Zhu Qingyu Yang College of Information Engineering Xiangtan University
Smart meters provide a lot of convenience for both power supply and consumption. Due to the frequent transmission of information, it brings great challenges to the privacy preservation of the user’s household power c... 详细信息
来源: cnki会议 评论