性学院 发表于 2025-4-1 03:22:56

http://reply.papertrans.cn/19/1857/185681/185681_61.png

arbiter 发表于 2025-4-1 07:14:46

https://doi.org/10.1007/978-3-031-27196-0 image watermarking algorithm is proposed, which combined with the contrast sensitivity characteristics of human visual system (HVS). In the algorithm, the scrambled watermark is embedded into the singular value matrix of image with some intensity, and its inverse process is used to extract the wate

enormous 发表于 2025-4-1 13:18:10

http://reply.papertrans.cn/19/1857/185681/185681_63.png

GUMP 发表于 2025-4-1 16:10:28

https://doi.org/10.1007/978-3-030-81772-5ty of users can share the decryption key, the attribute of traditional encryption mechanism cannot track leaking key malicious users, so in recent years, people study new traceable attribute based encryption schemes, supporting tracing key holders. This article analyzes the strengths and weaknesses

Liability 发表于 2025-4-1 21:08:52

Self-consistent-field (SCF)-methods,t concern. When users utilize LBSs, their location and trajectory information may expose their identities in continuous LBSs. Using the spatial and temporal correspondences on users’ trajectories, adversaries can easily gather their private information. Using collaboration between users instead of l

Musket 发表于 2025-4-2 01:22:57

http://reply.papertrans.cn/19/1857/185681/185681_66.png

HUSH 发表于 2025-4-2 05:43:39

http://reply.papertrans.cn/19/1857/185681/185681_67.png

Cytology 发表于 2025-4-2 08:46:15

https://doi.org/10.1007/978-1-4684-0255-1 effective use of data flow, with virtual deduction means, combined with real-time situation perception, to get a full understanding of the power system, and then can play an auxiliary role in the formulation of regulatory decisions. Different from the current simulation software, PSDT has the featu

FILTH 发表于 2025-4-2 12:15:43

https://doi.org/10.1007/978-1-84882-016-6 is still in its infancy. This paper first reviews the basic technology and development of blockchain, summarized and introduced the blockchain structure. In terms of blockchain security, we analyze and summarizes the domestic and foreign literatures in recent years, and divide blockchain security i
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Big Data and Security; Third International Yuan Tian,Tinghuai Ma,Zhaoqing Pan Conference proceedings 2022 Springer Nature Singapore Pte Lt