咨询与建议

限定检索结果

文献类型

  • 85 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 89 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 72 篇 工学
    • 54 篇 计算机科学与技术...
    • 27 篇 网络空间安全
    • 15 篇 控制科学与工程
    • 14 篇 软件工程
    • 13 篇 仪器科学与技术
    • 9 篇 电子科学与技术(可...
    • 9 篇 信息与通信工程
    • 6 篇 机械工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 测绘科学与技术
    • 2 篇 交通运输工程
    • 2 篇 公安技术
    • 1 篇 矿业工程
  • 22 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 5 篇 理学
    • 3 篇 数学
    • 2 篇 地球物理学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 艺术学
    • 4 篇 设计学(可授艺术学...
  • 3 篇 医学
    • 1 篇 临床医学
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 文学
    • 1 篇 外国语言文学
    • 1 篇 新闻传播学
  • 2 篇 军事学
    • 2 篇 军队指挥学

主题

  • 89 篇 data privacy
  • 9 篇 machine learning
  • 8 篇 federated learni...
  • 8 篇 artificial intel...
  • 7 篇 data security
  • 7 篇 blockchain
  • 7 篇 cloud computing
  • 6 篇 internet of thin...
  • 6 篇 deep learning
  • 6 篇 cryptography
  • 5 篇 security of data
  • 5 篇 data mining
  • 5 篇 privacy
  • 5 篇 数据隐私
  • 4 篇 security
  • 3 篇 cyber security
  • 3 篇 data integrity
  • 3 篇 authentication
  • 3 篇 protocols
  • 3 篇 cloud storage

机构

  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 1 篇 shaanxi key labo...
  • 1 篇 school of softwa...
  • 1 篇 college of autom...
  • 1 篇 the ohio state u...
  • 1 篇 computer enginee...
  • 1 篇 department of so...
  • 1 篇 school of mathem...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 fujian provincia...
  • 1 篇 department of in...
  • 1 篇 state key labora...
  • 1 篇 department of co...
  • 1 篇 school of inform...

作者

  • 2 篇 jianwei liu
  • 2 篇 shigong long
  • 2 篇 abdulatif alabdu...
  • 2 篇 wenqian shang
  • 2 篇 minyong shi
  • 2 篇 shengnan guo
  • 2 篇 haibin zhu
  • 2 篇 thomas m.fitzpat...
  • 2 篇 paul j.morrow
  • 2 篇 tong yi
  • 1 篇 yang qiliang
  • 1 篇 daniel jiménez-l...
  • 1 篇 ruoyang guo
  • 1 篇 pijush kanti dut...
  • 1 篇 jian wang
  • 1 篇 wang liming
  • 1 篇 k.sudharson
  • 1 篇 chen qiuling
  • 1 篇 zain ul abidin
  • 1 篇 yu yong

语言

  • 81 篇 英文
  • 8 篇 中文
检索条件"主题词=data privacy"
89 条 记 录,以下是1-10 订阅
排序:
A Double-Compensation-Based Federated Learning Scheme for data privacy Protection in a Social IoT Scenario
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 827-848页
作者: Junqi Guo Qingyun Xiong Minghui Yang Ziyun Zhao School of Artificial Intelligence Beijing Normal UniversityBeijing100875China Engineering Research Center of Intelligent Technology and Educational Application Ministry of EducationBeijing100875China
Nowadays,smart wearable devices are used widely in the Social Internet of Things(IoT),which record human physiological data in real *** protect the data privacy of smart devices,researchers pay more attention to feder... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Preserving data privacy in Speech data Publishing
收藏 引用
Journal of Donghua University(English Edition) 2020年 第4期37卷 293-297页
作者: SUN Jiaxin JIANG Jin ZHAO Ping College of Information Science and Technology Donghua UniversityShanghai 201620China
Speech data publishing breaches users'data privacy,thereby causing more privacy *** work sanitizes content,voice,and voiceprint of speech data without considering the consistence among these three features,and thus is... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Security Model for Analyzing data privacy in Multipath Transport
收藏 引用
China Communications 2012年 第5期9卷 32-41页
作者: Song Fei Xue Miao Zhang Sidong Beijing Jiaotong Univ Sch Elect & Informat Engn Natl Engn Lab Next Generat Internet Interconnect Beijing 100044 Peoples R China
In order to investigate the enhancement of data privacy by distributing data packets via multiple paths, this paper fommlates a security model and analyzes the privacy problem in mul- tipath scenarios leveraging infor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Interpretation of Information Security and data privacy Protection According to the data Use During the Epidemic
收藏 引用
通讯和计算机(中英文版) 2022年 第1期19卷 9-15页
作者: Liu Yang Zhang Jiahui Sun Kaiyang School of Marine Law and Humanities Dalian Ocean UniversityDalianChina
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Blockchain-Based data Acquisition with privacy Protection in UAV Cluster Network
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 879-902页
作者: Lemei Da Hai Liang Yong Ding Yujue Wang Changsong Yang Huiyong Wang Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information SecurityGuilin University of Electronic TechnologyGuilin541004China Cyberspace Security Research Center Pengcheng LaboratoryShenzhen518055China School of Mathematics and Computing Science Guilin University of Electronic TechnologyGuilin541004China
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancement of UAV data Security and privacy via Ethereum Blockchain Technology
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1797-1815页
作者: Sur Singh Rawat Youseef Alotaibi Nitima Malsa Vimal Gupta Department of Computer Science and Engineering JSS Academy of Technical EducationNoida201301India Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia
Unmanned aerial vehicles(UAVs),or drones,have revolutionized a wide range of industries,including monitoring,agriculture,surveillance,and supply ***,their widespread use also poses significant challenges,such as publi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
data Aggregation privacy in WSN
Data Aggregation Privacy in WSN
收藏 引用
作者: Jianbo Yao Chaoqiong Yang School of Mathematics and Computer Hezhou University Audit Division Zunyi Normal College
When WSN is applied to monitoring,the privacy of monitoring data from monitoring objects becomes an important issue for the successful application of WSN,which requires effective privacy protection for data ***(Clust... 详细信息
来源: cnki会议 评论
A privacy-preserving method for publishing data with multiple sensitive attributes
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 222-238页
作者: Tong Yi Minyong Shi Wenqian Shang Haibin Zhu School of Computer Science and Engineering Guangxi Normal UniversityGuilinChina School of Computer Science Communication University of ChinaBeijingChina Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada
The overgeneralisation may happen because most studies on data publishing for multiple sensitive attributes(SAs)have not considered the personalised privacy ***,sensitive information disclosure may also be caused by t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hybrid Approach for privacy Enhancement in data Mining Using Arbitrariness and Perturbation
收藏 引用
Computer Systems Science & Engineering 2023年 第3期44卷 2293-2307页
作者: B.Murugeshwari S.Rajalakshmi K.Sudharson Department of Computer Science and Engineering Velammal Engineering CollegeChennai600066India Department of Information Technology Velammal Institute of TechnologyChennai601204India
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this *** several data mining methods,privacy has beco... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Federated Learning Based on data Divergence and Differential privacy in Financial Risk Control Research
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 863-878页
作者: Mao Yuxin Wang Honglin School of Artificial Intelligence/School of Future Technology Nanjing University of Information Science and TechnologyNanjing210044China
In the financial sector, data are highly confidential and sensitive,and ensuring data privacy is critical. Sample fusion is the basis of horizontalfederation learning, but it is suitable only for scenarios where custo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论