[1] |
WANG Tian-yang, LI Xiao-hui, CHEN Hong-yang.
A personalized differential privacy protection scheme for multidimensional data of participatory sensing devices
[J]. Computer Engineering & Science, 2024, 46(11): 1997-2006.
|
[2] |
XIAO Di, YU Zhu-yang, LI Min, WANG Lian.
A secure federated learning scheme based on differential privacy and model clustering
[J]. Computer Engineering & Science, 2024, 46(09): 1606-1615.
|
[3] |
WANG Yong-jun, LIU Han-yang, WANG Hui, SHEN Zi-hao, LIU Kun, LIU Pei-qian.
A privacy-preserving region-sensitive crowdsensing task allocation mechanism
[J]. Computer Engineering & Science, 2024, 46(08): 1414-1424.
|
[4] |
DONG Yan-ling , ZHANG Shu-fen, XU Jing-cheng, WANG Hao-shi, .
Research on differential privacy protection for Stacking algorithm
[J]. Computer Engineering & Science, 2024, 46(02): 244-252.
|
[5] |
WANG Hui, CHEN Yu, SHEN Zi-hao, LIU Pei-qian.
A trajectory data differential privacy protection scheme that combines contrast supervision and sorting tree
[J]. Computer Engineering & Science, 2023, 45(10): 1797-1805.
|
[6] |
LI Shuai, CHANG Jin-cai, LI-L Mu-zhi, CAI Kun-jie, .
A Stacking ensemble clustering algorithm based on differential privacy protection
[J]. Computer Engineering & Science, 2022, 44(08): 1402-1408.
|
[7] |
YUAN Quan, YAN Fei-yang, WEN Zhi-yun, ZHANG Zhen-kang, .
A differential privacy protection algorithm in social network based on spectral clustering
[J]. Computer Engineering & Science, 2022, 44(02): 251-256.
|
[8] |
JIA Jun-jie,CHEN Hui,MA Hui-fang,MU Yu-xiang.
Query consistency constraints of differential privacy
[J]. Computer Engineering & Science, 2020, 42(01): 71-79.
|
[9] |
FU Yuxiang1,QIN Yongbin1,2,SHEN Guowei1,2.
Multi-source data privacy protection
based on transfer learning
[J]. Computer Engineering & Science, 2019, 41(04): 641-648.
|
[10] |
GAO Zhiqiang,CUI Xiaolong,ZHOU Sha,YUAN Chen.
Local differential privacy protection and its applications
[J]. Computer Engineering & Science, 2018, 40(06): 1029-1036.
|
[11] |
ZHU Wenqiang,ZHONG Yuansheng.
A multidimensional reputation computation
model for O2O Ecommerce
[J]. Computer Engineering & Science, 2016, 38(12): 2499-2506.
|
[12] |
WU Weimin,HUANG Huankun.
A DP-DBScan clustering algorithm based on
differential privacy preserving
[J]. J4, 2015, 37(04): 830-834.
|
[13] |
CHEN Hongliang,LIU Liping,ZHAO Ming,CHEN Zhigang.
Trust-based management for dynamic
spectrum access in cognitive wireless networks
[J]. J4, 2015, 37(03): 498-502.
|
[14] |
SONG Chang-ming,GONG Dao-yong,ZHANG Hong-yu.
A parallel job launch model and its scalability analysis
[J]. J4, 2013, 35(11): 182-186.
|
[15] |
GUI Chunmei,WANG Huaimin,WU Quanyuan,JIAN Qiang.
A PenaltyIncentiveBased Reputation Model in InternetBased Virtual Computing Environments
[J]. J4, 2010, 32(4): 93-96.
|