Zobrazeno 1 - 10
of 232
pro vyhledávání: '"security and privacy protection"'
Publikováno v:
Jisuanji kexue yu tansuo, Vol 18, Iss 9, Pp 2293-2325 (2024)
Artificial intelligence generated content (AIGC) models have attracted widespread attention and application worldwide due to their excellent content generation capabilities. However, the rapid development of AIGC large models also brings a series of
Externí odkaz:
https://doaj.org/article/baab6cd638874c29aae65b105f1d5eef
Publikováno v:
Tongxin xuebao, Vol 45, Pp 166-179 (2024)
Aiming at the problem that the existing federated learning schemes cannot adaptively defend Byzantine attacks and low model accuracy, a secure federated learning scheme based on adaptive Byzantine defense was proposed. Through adaptive preliminary ag
Externí odkaz:
https://doaj.org/article/67ac0a35b9584e4baabf4003c048becb
Autor:
Wei Li, Qian Huang
Publikováno v:
Egyptian Informatics Journal, Vol 28, Iss , Pp 100569- (2024)
Aiming at the hidden danger of information security caused by the lack of medical big data information security firewall, this paper proposes a security privacy protection method for hospital big data based on hybrid encryption algorithm. First, coll
Externí odkaz:
https://doaj.org/article/caf61f8898024797981ad880b93c0ae9
Autor:
Ryan Mcconkey, Oluwafemi Olukoya
Publikováno v:
IEEE Access, Vol 12, Pp 1-22 (2024)
Data and privacy laws, such as the GDPR, require mobile apps that collect and process the personal data of their citizens to have a legally-compliant policy. Since these mobile apps are hosted on app distribution platforms such as Google Play Store a
Externí odkaz:
https://doaj.org/article/4a1a7cb7f94b452085b6a20fd36f915e
Publikováno v:
IEEE Access, Vol 11, Pp 56181-56195 (2023)
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the N
Externí odkaz:
https://doaj.org/article/012a73c28475477a9a59316a83300091
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Caiping Guo, Daqing Li
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2021, Iss 1, Pp 1-14 (2021)
Abstract Once the Internet of Things was proposed, it has received great attention from all walks of life and has become one of the top ten technologies that change the world. Therefore, more and more people are engaged in the research of the Interne
Externí odkaz:
https://doaj.org/article/c1398a04be0c4c10a93c9c10805240c3
Publikováno v:
IEEE Access, Vol 9, Pp 78658-78700 (2021)
Anomaly detection has been used for decades to identify and extract anomalous components from data. Many techniques have been used to detect anomalies. One of the increasingly significant techniques is Machine Learning (ML), which plays an important
Externí odkaz:
https://doaj.org/article/1a6db49b0bc745df82f8ab27abc9f800
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.