probate 发表于 2025-3-26 21:35:53

http://reply.papertrans.cn/19/1857/185681/185681_31.png

Jogging 发表于 2025-3-27 02:27:04

Business-to-Business E-Commercecess of sensitive data in power system. The architecture and functional composition of sensitive data identification system for power system are proposed. Finally, the implementation process of sensitive data protection is given.

Calibrate 发表于 2025-3-27 06:23:59

http://reply.papertrans.cn/19/1857/185681/185681_33.png

CAJ 发表于 2025-3-27 13:06:33

Other Important Materials for Electronics,ous existing out-sourced PSI protocols, including verifiable PSI, multi-party PSI, PSI-CA, quantum-based PSI, post-quantum-based PSI, fog-based PSI, blockchain-based PSI, attribute-based PSI, etc. Through the comparative analysis and summary of the existing schemes, we further discussed the future research direction.

FOLLY 发表于 2025-3-27 16:20:32

http://reply.papertrans.cn/19/1857/185681/185681_35.png

Limousine 发表于 2025-3-27 19:42:45

http://reply.papertrans.cn/19/1857/185681/185681_36.png

enchant 发表于 2025-3-28 00:15:52

Application of Digital Twin in the Security Protection of the Internet of Things in Power System Finally, the application status and prospects of PSDT in many fields of power systems are clarified. The research results of this paper promote the development of dt technology and the application of data science in engineering.

歹徒 发表于 2025-3-28 06:02:52

Privacy Preserving Facial Image Processing Method Using Variational Autoencoderbuse of facial images become more serious. The existing simple face de-identification methods like occlusion or blurring seriously damage the useful information and structure of image, which leads to a poor visual effect and is of little significant in practical application. In this work, we propose

resuscitation 发表于 2025-3-28 07:44:56

A Survey on Privacy-Preserving Deep Learning with Differential Privacyded to train a deep learning model. The data might contain sensitive information, leading to the risk of privacy leakage in the process of model training and model application. As a privacy definition with strict mathematical guarantee, differential privacy has gained great attention and has been wi

未完成 发表于 2025-3-28 14:19:48

Research on Security Protection Model of Power Big Data power system. In the current big data environment, the study of power system security has important practical value. On account of this, this paper first analyses the data security situation and response of power system, then studies the power data security protection system and power big data secu
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Big Data and Security; Third International Yuan Tian,Tinghuai Ma,Zhaoqing Pan Conference proceedings 2022 Springer Nature Singapore Pte Lt