呻吟 发表于 2025-3-21 19:21:47
书目名称Big Data and Security影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0185681<br><br> <br><br>书目名称Big Data and Security读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0185681<br><br> <br><br>extemporaneous 发表于 2025-3-21 23:38:23
Research on Navigation Algorithm Model of Virtual Tourism System Based on GIS无孔 发表于 2025-3-22 03:47:20
http://reply.papertrans.cn/19/1857/185681/185681_3.pngCESS 发表于 2025-3-22 06:33:36
http://reply.papertrans.cn/19/1857/185681/185681_4.png并排上下 发表于 2025-3-22 12:02:37
Vehicle Road Privacy Recommendation System Equipped with Markov Chainerences. Then, according to the congestion degree of the road section, the sensitive circle range is defined for each query position of the recommended route, and the acceptable deviation range of the user virtual position is superimposed to protect the differential privacy. Experimental results sho歌曲 发表于 2025-3-22 14:43:05
Image Watermark Combining with Discrete Wavelet Transform and Singular Value Decompositionh 26.1793 dB and 0.8517, which has better robustness than the 8 existing watermarking algorithms. The comprehensive results indicate that the proposed algorithm can commendably balance the relationship among robustness, visual transparency and watermark embedding amount in the process of watermark e柳树;枯黄 发表于 2025-3-22 17:58:39
Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBSy content preservation based on a fake query concept in which we conceal the user’s actual query among a set of queries. The results of several experiments with different conditions confirm that our proposed scheme can protect users’ trajectory privacy successfully in a trustworthy and efficient man损坏 发表于 2025-3-22 23:53:38
http://reply.papertrans.cn/19/1857/185681/185681_8.pngcontradict 发表于 2025-3-23 04:07:40
Design Guidance for Lightweight Object Detection Modelsss. For the network structure, the width and depth of the network are adjusted, the amount of parameters of the model is compressed. The training process is divided into the first, middle and last three stages to improve the detection performance of the model without adding extra computation. Takingathlete’s-foot 发表于 2025-3-23 06:52:24
Research on Blockchain Security Risk Analysis and Coping Strategiess the classification of attack methods on blockchain. Then, we summarized the defense strategies to deal with the above security issues and analyzed the shortcomings and problems. Finally, based on the current research status of blockchain, we point out two future research directions.