性学院 发表于 2025-4-1 03:22:56
http://reply.papertrans.cn/19/1857/185681/185681_61.pngarbiter 发表于 2025-4-1 07:14:46
https://doi.org/10.1007/978-3-031-27196-0 image watermarking algorithm is proposed, which combined with the contrast sensitivity characteristics of human visual system (HVS). In the algorithm, the scrambled watermark is embedded into the singular value matrix of image with some intensity, and its inverse process is used to extract the wateenormous 发表于 2025-4-1 13:18:10
http://reply.papertrans.cn/19/1857/185681/185681_63.pngGUMP 发表于 2025-4-1 16:10:28
https://doi.org/10.1007/978-3-030-81772-5ty of users can share the decryption key, the attribute of traditional encryption mechanism cannot track leaking key malicious users, so in recent years, people study new traceable attribute based encryption schemes, supporting tracing key holders. This article analyzes the strengths and weaknessesLiability 发表于 2025-4-1 21:08:52
Self-consistent-field (SCF)-methods,t concern. When users utilize LBSs, their location and trajectory information may expose their identities in continuous LBSs. Using the spatial and temporal correspondences on users’ trajectories, adversaries can easily gather their private information. Using collaboration between users instead of lMusket 发表于 2025-4-2 01:22:57
http://reply.papertrans.cn/19/1857/185681/185681_66.pngHUSH 发表于 2025-4-2 05:43:39
http://reply.papertrans.cn/19/1857/185681/185681_67.pngCytology 发表于 2025-4-2 08:46:15
https://doi.org/10.1007/978-1-4684-0255-1 effective use of data flow, with virtual deduction means, combined with real-time situation perception, to get a full understanding of the power system, and then can play an auxiliary role in the formulation of regulatory decisions. Different from the current simulation software, PSDT has the featuFILTH 发表于 2025-4-2 12:15:43
https://doi.org/10.1007/978-1-84882-016-6 is still in its infancy. This paper first reviews the basic technology and development of blockchain, summarized and introduced the blockchain structure. In terms of blockchain security, we analyze and summarizes the domestic and foreign literatures in recent years, and divide blockchain security i