Spinal-Fusion 发表于 2025-3-23 09:57:05
http://reply.papertrans.cn/16/1531/153089/153089_11.png恃强凌弱 发表于 2025-3-23 16:50:53
http://reply.papertrans.cn/16/1531/153089/153089_12.pngBLAND 发表于 2025-3-23 18:03:51
,HR-,ESP: A Heuristic Algorithm for Robustness-Oriented , Edge Server Placement,constraint is satisfied. The comparison experiments have been conducted on a public dataset, showing that our HR-.ESP algorithm achieves a better optimization effect than the other four benchmark algorithms in most cases.follicle 发表于 2025-3-24 01:05:52
,A Hybrid Kernel Pruning Approach for Efficient and Accurate CNNs,as feature extractors, we design a functional similarity-based pruning algorithm as the criteria for selecting pruned kernels. Our experimental results show that when pruning ResNet with a high pruning ratio, this algorithm can obtain a sparse model with high accuracy. Moreover, when combined with themoglobin 发表于 2025-3-24 03:17:44
http://reply.papertrans.cn/16/1531/153089/153089_15.png惊惶 发表于 2025-3-24 08:36:07
,A Graph Generation Network with Privacy Preserving Capabilities,ls, with a particular emphasis on preserving edge privacy in graph data to ensure connection privacy in relational data. To enhance edge differential privacy, appropriate noise is injected into the gradient of link-reconstruction-based graph generative models.爱花花儿愤怒 发表于 2025-3-24 12:32:32
http://reply.papertrans.cn/16/1531/153089/153089_17.pngServile 发表于 2025-3-24 15:31:56
,CFChain: A Crowdfunding Platform that Supports Identity Authentication, Privacy Protection, and Eff non-linkability of user identities in the face of sybil attacks, nor do they offer a streamlined auditing mechanism for crowdsourcing modest donations that simultaneously preserves transactional privacy. This paper presents a novel crowdfunding system called CFChain based on blockchain technology.Canary 发表于 2025-3-24 22:37:49
,TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery SysteAuthentication Framework (TBAF) that enhances security and efficiency. In TBAF, a novel secret sharing method is designed to distribute storage biometric templates with protection, ensuring the secret values which are biometric templates can only be accessed by authorized parties. Additionally, thefoodstuff 发表于 2025-3-24 23:39:54
http://reply.papertrans.cn/16/1531/153089/153089_20.png