咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 63 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 56 篇 工学
    • 41 篇 计算机科学与技术...
    • 25 篇 网络空间安全
    • 11 篇 电子科学与技术(可...
    • 8 篇 信息与通信工程
    • 7 篇 仪器科学与技术
    • 7 篇 软件工程
    • 4 篇 机械工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
  • 9 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 地球物理学
    • 1 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 63 篇 privacy-preservi...
  • 8 篇 blockchain
  • 7 篇 cloud computing
  • 6 篇 federated learni...
  • 4 篇 iot
  • 4 篇 data aggregation
  • 3 篇 homomorphic encr...
  • 3 篇 k-anonymity
  • 3 篇 smart grid
  • 3 篇 big data
  • 3 篇 data mining
  • 3 篇 security
  • 2 篇 clustering
  • 2 篇 deep learning
  • 2 篇 location-based s...
  • 2 篇 image encryption
  • 2 篇 smart contract
  • 2 篇 secure two-party...
  • 2 篇 fog computing
  • 2 篇 data security

机构

  • 2 篇 department of in...
  • 2 篇 college of compu...
  • 2 篇 guangxi key labo...
  • 1 篇 college of mathe...
  • 1 篇 school of comput...
  • 1 篇 school of cyber ...
  • 1 篇 institute of adv...
  • 1 篇 qianxin technolo...
  • 1 篇 nanyang technolo...
  • 1 篇 zte corporation ...
  • 1 篇 college of compu...
  • 1 篇 department of au...
  • 1 篇 communication an...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 shanghai key lab...
  • 1 篇 shanghai key lab...
  • 1 篇 southeast instit...
  • 1 篇 the department o...
  • 1 篇 dept.of computer...

作者

  • 2 篇 chaoyang li
  • 2 篇 yuan tian
  • 2 篇 shui yu
  • 2 篇 zhitao guan
  • 2 篇 alia alabdulkari...
  • 2 篇 mingfang jiang
  • 2 篇 mznah al-rodhaan
  • 2 篇 liang chang
  • 2 篇 xiaolei dong
  • 2 篇 zhenfu cao
  • 2 篇 jianhong zhang
  • 1 篇 henry ker-chang ...
  • 1 篇 abhinandan r pat...
  • 1 篇 qijia zhang
  • 1 篇 tao yang
  • 1 篇 dan yin
  • 1 篇 chao lin
  • 1 篇 han bingtao
  • 1 篇 jing zhang
  • 1 篇 tang bo

语言

  • 60 篇 英文
  • 3 篇 中文
检索条件"主题词=Privacy-Preserving"
63 条 记 录,以下是1-10 订阅
排序:
privacy-preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A privacy-preserving Energy Management System Based on Homomorphic Cryptosystem for IoT-enabled Active Distribution Network
收藏 引用
Journal of Modern Power Systems and Clean Energy 2024年 第1期12卷 167-178页
作者: Qian Hu Siqi Bu Wencong Su Vladimir Terzija the Department of Physics Hong Kong Baptist UniversityHong KongChina the Department of Electrical and Electronic Engineering Shenzhen Research InstituteThe Hong Kong Polytechnic UniversityHong KongChina the Department of Electrical and Computer Engineering University of Michigan-DearbornDearbornMI 48128USA the School of Engineering Newcastle UniversityNewcastleUK
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity *** this paper,the eavesdropping attack... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Comprehensive Survey for privacy-preserving Biometrics: Recent Approaches, Challenges, and Future Directions
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2087-2110页
作者: Shahriar Md Arman Tao Yang Shahadat Shahed Alanoud AlMazroa Afraa Attiah Linda Mohaisen School of Computer Science and Technology Zhejiang Gongshang UniversityHangzhou310018China School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China College of Computer and Information Sciences Princess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia
The rapid growth of smart technologies and services has intensified the challenges surrounding identity authenti-cation *** credentials are increasingly being used for verification due to their advantages over traditi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
PARE:privacy-preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3067-3084页
作者: Peicong He Yang Xin Yixian Yang School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China
The proliferation of intelligent,connected Internet of Things(IoT)devices facilitates data ***,task workers may be reluctant to participate in data collection due to privacy concerns,and task requesters may be concern... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
privacy-preserving Data Publishing for Multiple Numerical Sensitive Attributes
收藏 引用
Tsinghua Science and Technology 2015年 第3期20卷 246-254页
作者: Qinghai Liu Hong Shen Yingpeng Sang School of Computer and Information Technology Beijing Jiaotong University School of Information Science and Technology Sun Yat-sen University School of Computer Science University of Adelaide
Anonymized data publication has received considerable attention from the research community in recent years. For numerical sensitive attributes, most of the existing privacy-preserving data publishing techniques conce... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 148-156页
作者: Dongmei LI Xiaolei DONG Zhenfu CAO Haijiang WANG Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Lab of Trustworthy Computing East China Normal University
Along with the prevalence of cloud computing, it can be realised to efficiently outsource costly storage or computations to cloud servers. Recently, secure outsourcing mechanism has received more and more attention. W... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
privacy-preserving Recommendation Based on Kernel Method in Cloud Computing
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 779-791页
作者: Tao Li Qi Qian Yongjun Ren Yongzhen Ren Jinyue Xia College of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China College of Electronic and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China College of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China International Business Machines Corporation(IBM) NYUSA
The application field of the Internet of Things(IoT)involves all aspects,and its application in the fields of industry,agriculture,environment,transportation,logistics,security and other infrastructure has effectively... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
privacy-preserving Decision Protocols Based on Quantum Oblivious Key Distribution
收藏 引用
Computers, Materials & Continua 2020年 第9期64卷 1915-1928页
作者: Kejia Zhang Chunguang Ma Zhiwei Sun Xue Zhang Baomin Zhou Yukun Wang School of Computer Science and Technology Harbin Engineering UniversityHarbin150001China School of Mathematical Science Heilongjiang UniversityHarbin150080China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing100876China Center for Quantum Computing Peng Cheng LaboratoryShenzhen518055China College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Artificial Intelligence Shenzhen PolytechnicShenzhen518055China Department of Electrical and Computer Engineering National University of Singapore117583Singapore
Oblivious key transfer(OKT)is a fundamental problem in the field of secure multi-party *** makes the provider send a secret key sequence to the user obliviously,i.e.,the user may only get almost one bit key in the seq... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
privacy-preserving Deep Learning on Big Data in Cloud
收藏 引用
China Communications 2023年 第11期20卷 176-186页
作者: Yongkai Fan Wanyu Zhang Jianrong Bai Xia Lei Kuanching Li State Key Laboratory of Media Convergence and Communication Communication University of ChinaBeijing 100024China Industrial and Commercial Bank of China Zhuhai Branch Zhuhai 519000China Dept.of Computer Science and Information Engineering Providence UniversityTaichung 43301China
In the analysis of big data,deep learn-ing is a crucial *** data analysis tasks are typically carried out on the cloud since it offers strong computer capabilities and storage ***-ertheless,there is a contradiction be... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
privacy-preserving deep learning techniques for wearable sensor-based big data applications
收藏 引用
Virtual Reality & Intelligent Hardware 2022年 第3期4卷 210-222页
作者: Rafik HAMZA Minh-Son DAO Integrated Big Data Research Center|NICT-National Institute of Information and Communications Technology TokyoJapan
Wearable technologies have the potential to become a valuable influence on human daily life where they may enable observing the world in new ways,including,for example,using augmented reality(AR)*** technology uses el... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论