Zobrazeno 1 - 10
of 99
pro vyhledávání: '"Chia-Mu YU"'
Publikováno v:
Applied Sciences, Vol 14, Iss 14, p 6368 (2024)
Local differential privacy (LDP) protects user information from potential threats by randomizing data on individual devices before transmission to untrusted collectors. This method enables collectors to derive user statistics by analyzing randomized
Externí odkaz:
https://doaj.org/article/ca27d3faa092439e86d1045286a1b1f8
Publikováno v:
IET Communications, Vol 16, Iss 20, Pp 2406-2413 (2022)
Abstract Intelligent reflecting surface (IRS) composed of a large number of low‐cost, phase‐adjustable passive reflecting elements, which is an attractive solution of overcoming the signal attenuation and interference. IRS can be used as a low‐
Externí odkaz:
https://doaj.org/article/b77956dc3bd8464aa07c97411736c5f8
Publikováno v:
IEEE Access, Vol 10, Pp 124534-124544 (2022)
Autonomous Vehicles (AVs) are equipped with several sensors which produce various forms of data, such as geo-location, distance, and camera data. The volume and utility of these data, especially camera data, have contributed to the advancement of hig
Externí odkaz:
https://doaj.org/article/32708449dd8d4b67a0024941011c6c1d
Publikováno v:
IEEE Access, Vol 8, Pp 1715-1732 (2020)
Recently, the rapid development of Internet of things (IoT) has resulted in the generation of a considerable amount of data, which should be stored. Therefore, it is necessary to develop methods that can easily capture, save, and modify these data. T
Externí odkaz:
https://doaj.org/article/e1c2b2d43d1640debfef55baa12fc5b3
Publikováno v:
Sensors, Vol 10, Iss 4, Pp 2770-2792 (2010)
An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink
Externí odkaz:
https://doaj.org/article/d455cfc05a7e4080a2c2371eb08f7121
Autor:
Chia-Mu Yu, 游家牧
92
In classical cryptography, many researcher have invented several useful cryptosytems. But, all of them are based on different classical computational assumptions, like the hardness of factoring or discrete logarithm. Nobody knows when the ass
In classical cryptography, many researcher have invented several useful cryptosytems. But, all of them are based on different classical computational assumptions, like the hardness of factoring or discrete logarithm. Nobody knows when the ass
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/81338771142461468269
Publikováno v:
IEEE Internet of Things Journal. 9:15886-15900
Publikováno v:
IEICE Transactions on Information and Systems. :1418-1430
Publikováno v:
Multimedia Systems. 28:793-814
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783031284502
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::15685a897c7ffb4c9695195596fdb7e8
https://doi.org/10.1007/978-3-031-28451-9_44
https://doi.org/10.1007/978-3-031-28451-9_44