Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Bangzhou Xin"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-11 (2024)
Abstract With development of blockchain technology, clouding computing and Internet of Things (IoT), blockchain and cloud of things (BCoT) has become development tendency. But the security has become the most development hinder of BCoT. Attack detect
Externí odkaz:
https://doaj.org/article/a3738031ff1a423bbfeaeabe72621d1b
Publikováno v:
Sensors, Vol 22, Iss 22, p 8697 (2022)
Recent work has shown that deep neural networks are vulnerable to backdoor attacks. In comparison with the success of backdoor-attack methods, existing backdoor-defense methods face a lack of theoretical foundations and interpretable solutions. Most
Externí odkaz:
https://doaj.org/article/929374731f20423a8b79593b3cab2ac8
Publikováno v:
Sensors, Vol 20, Iss 18, p 5297 (2020)
The insider threats have always been one of the most severe challenges to cybersecurity. It can lead to the destruction of the organisation’s internal network system and information leakage, which seriously threaten the confidentiality, integrity a
Externí odkaz:
https://doaj.org/article/51dcd29162d244db935b862fe8ed97ee
Publikováno v:
Soft Computing. 27:1015-1031
Publikováno v:
ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Publikováno v:
Neurocomputing. 468:1-10
Distributed machine learning has attracted much attention in the last decade with the widespread use of the Internet of Things. As a generative model, Generative Adversarial Network (GAN) has excellent empirical performance. However, the distributed
Publikováno v:
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Publikováno v:
IJCNN
While machine learning brings convenience, it also faces the issue of data privacy. For privacy issues, most researches focus on implementing homomorphic encryption or differential privacy to protect data, while ignoring the potential threats caused
Publikováno v:
Sensors
Volume 20
Issue 18
Sensors (Basel, Switzerland)
Sensors, Vol 20, Iss 5297, p 5297 (2020)
Volume 20
Issue 18
Sensors (Basel, Switzerland)
Sensors, Vol 20, Iss 5297, p 5297 (2020)
The insider threats have always been one of the most severe challenges to cybersecurity. It can lead to the destruction of the organisation&rsquo
s internal network system and information leakage, which seriously threaten the confidentiality, in
s internal network system and information leakage, which seriously threaten the confidentiality, in