[PDF][PDF] 阁EasyChair Preprint

NEMM Threats - 2024 - easychair.org
… , code review processes, and app vetting in minimizing the risk of mobile malware. … a
challenging task. This section explores privacy-preserving techniques for mobile malware …

一种面向位置感知推荐系统的隐私保框架

X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu - Science China Information …, 2017 - Springer
… Finally, empirical results over a real-world dataset … the aforementioned challenges, we
propose a privacy-preserving … To protect such private information, the ratings Rt and attributes Av …

多数据拥有者场景中的可验证的关键字检索

Y Miao, J Ma, X Liu, J Zhang, Z Liu - Science China Information Sciences, 2017 - Springer
… in a privacy-preserving manner, where most of SE schemes … ranked search over encrypted
mobile cloud data through blind … accredited symmetrically private information retrieval. In: …

Data Mining for Cyber 𠄁Physical Systems

MV Rao, DA Reddy, A Ampavathi… - Data Mining and …, 2022 - Wiley Online Library
… of huge observing information on CPS makes difficulties for … One possible way to deal
with safe, private information during … , SCT, Privacy-preserving data analytics in the cloud-based …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… the IoT based architecture and risk management in the supply … blockchain-based
privacy-preserving software update protocol … , Privacy-preserving support vector machine training …

[PDF][PDF] 云计算环境安全综述

张玉清, 王晓菲, 刘雪峰, 刘玲 - 软件学报, 2016 - jos.org.cn
… of cloud computing technology, its security issues have become … it more difficult to share or
search users’ private data. The … and privacy preserving technologies in cloud computing, this …

基于信息-物理-社会-思维融合空间的物联网科学技术体系研究

HS Ning, H Liu - Science China Information Sciences, 2015 - Springer
… Furthermore, anonymous mechanisms are emerging to address privacy-preserving issues,
… The quantum key distribution (QKD) and quantum teleportation are the critical issues during

一种在社交网络中基于属性的保护隐私的声誉评价系统

郭霖珂, 张驰, 方玉光, 林风 - 计算机科学技术学报, 2015 - jcst.ict.ac.cn
… store users’ private information together with users’ key pairs, … the identity privacy or incur
unintended issues if he/she uses … In this section, we elaborate our privacy-preserving attribute-…

基于隐私风险评估的脱敏算法自适应方法

祖立军, 曹雅琳, 门小骅, 吕智慧, 叶家炜… - 网络与信息安全 … - infocomm-journal.com
… desensitization methods and privacy-preserving technologies, … issues of reduced data
usability and inadequate personal … the effectiveness of personal information de-identification[S]. …

基于SGX 的区块链可验证查询处理

邵奇峰, 张召, 金澈清, 周傲英 - 计算机科学技术学报, 2023 - jcst.ict.ac.cn
… To address the above issues, it is necessary to devise a new … Ekiden[15] performs smart
contracts over private data off-… access patterns and serves privacy-preserving requests from light …