ARIA 发表于 2025-3-28 15:55:21

http://reply.papertrans.cn/17/1670/166937/166937_41.png

格子架 发表于 2025-3-28 22:18:02

http://reply.papertrans.cn/17/1670/166937/166937_42.png

容易懂得 发表于 2025-3-29 00:59:55

http://reply.papertrans.cn/17/1670/166937/166937_43.png

Deadpan 发表于 2025-3-29 05:24:28

Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Saand indirectly manipulating and interacting with an algorithm. For this purpose, we selected the Ant Colony Optimization (ACO) framework, and use it on the Traveling Salesman Problem (TSP) which is of high importance in solving many practical problems in health informatics, e.g. in the study of prot

难解 发表于 2025-3-29 10:55:33

A Blockcipher Based Authentication Encryptiononstruction of AE should satisfies the properties of efficiency and upper security bound due to limitation of power and memory for the constrained device. Therefore, we propose a blockcipher based AE that satisfies upper privacy security bound . and it operates in parallel mode. It doesn’t need decr

不感兴趣 发表于 2025-3-29 13:09:46

An Efficient Construction of a Compression Function for Cryptographic Hashound rather than efficiency. Therefore, a more efficient construction of blockcipher based compression function is proposed, where it provides higher efficiency-rate including a satisfactory collision security bound. The efficiency-rate . of the proposed scheme is .. Furthermore, the collision secur

NICE 发表于 2025-3-29 16:30:04

http://reply.papertrans.cn/17/1670/166937/166937_47.png

Instantaneous 发表于 2025-3-29 21:33:58

http://reply.papertrans.cn/17/1670/166937/166937_48.png

草率男 发表于 2025-3-30 02:14:38

A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysislements the primitive instructions foreseen by the architecture. An open-source reference implementation of this architecture is provided for the R language. We use these results to argue that the tension between medical research and privacy requirements can be technically alleviated and we outline

aspersion 发表于 2025-3-30 04:05:59

The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Basesditions. Their choices include a re-design of their data infrastructure as well as preventive actions like anonymization of databases per default. Therefore, insights into the effects of perturbed/anonymized knowledge bases on the quality of machine learning results are a crucial basis for successfu
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Availability, Reliability, and Security in Information Systems; IFIP WG 8.4, 8.9, TC Francesco Buccafurri,Andreas Holzinger,Edgar Weipp Con