neutrophils 发表于 2025-3-25 04:17:15

http://reply.papertrans.cn/19/1857/185684/185684_21.png

Intersect 发表于 2025-3-25 11:29:34

http://reply.papertrans.cn/19/1857/185684/185684_22.png

intuition 发表于 2025-3-25 12:31:54

http://reply.papertrans.cn/19/1857/185684/185684_23.png

BOOST 发表于 2025-3-25 19:38:53

http://reply.papertrans.cn/19/1857/185684/185684_24.png

思想流动 发表于 2025-3-25 22:15:28

DOE and Regression Case Studiesng window as well as relation and sensitive matrix, which can make anonymous streaming data effectively defense background knowledge attack and homogeneity attack while solving sensitive attribute diversity. Experimental results indicate that RSLK-anonymity algorithm is practical, effective and highly efficient.

强壮 发表于 2025-3-26 03:15:02

http://reply.papertrans.cn/19/1857/185684/185684_26.png

faultfinder 发表于 2025-3-26 07:47:51

Quick Response Code Based on Least Significant BitR code is merged with the least significant bit of the picture. It is shown that cannot be recognized by the naked eye. This method can ensure the safety and security of the information during the transmission process. Accuracy, and greatly improve the visual aesthetics of the QR code.

Sedative 发表于 2025-3-26 10:35:07

http://reply.papertrans.cn/19/1857/185684/185684_28.png

Volatile-Oils 发表于 2025-3-26 14:28:27

http://reply.papertrans.cn/19/1857/185684/185684_29.png

MELON 发表于 2025-3-26 18:57:55

Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithmng window as well as relation and sensitive matrix, which can make anonymous streaming data effectively defense background knowledge attack and homogeneity attack while solving sensitive attribute diversity. Experimental results indicate that RSLK-anonymity algorithm is practical, effective and highly efficient.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Big Data and Security; Second International Yuan Tian,Tinghuai Ma,Muhammad Khurram Khan Conference proceedings 2021 Springer Nature Singapo