Harpoon 发表于 2025-3-26 20:58:55
A Visual Tool for Interactively Privacy Analysis and Preservation on Order-Dynamic Tabular Data adjustment. Novel visual designs, i.e., data abstract, risk tree, integrated privacy enhancement, are developed to explore data correlations and acquire privacy awareness. We demonstrate TPA’s effectiveness with a case study on the prototype and qualitatively discuss the pros and cons with domain experts for future improvement.deviate 发表于 2025-3-27 02:23:15
http://reply.papertrans.cn/23/2295/229415/229415_32.pngdandruff 发表于 2025-3-27 07:01:05
An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identificationtures of IoT traffic, which is able to automatically extract the high-level features from raw IoT traffic. The further evaluation indicates that our method is capable of identifying diverse IoT devices with satisfactory accuracy.Budget 发表于 2025-3-27 10:26:25
Research on Depth-Adaptive Dual-Arm Collaborative Grasping Methodd pixel information. Finally, the task is assigned to the left and right robotic arms, and the target grabbing task is realized based on the main-auxiliary control. The proposed approach is validated in multiple experiments on a Baxter robot under different conditions.CLEFT 发表于 2025-3-27 15:38:41
https://doi.org/10.1007/b136519ng the privacy information of victims while maintaining the accuracy of the global model. Comprehensive experimental results demonstrated that our method is effective in the prevention of GAN-based privacy inferring attacks.突变 发表于 2025-3-27 19:53:57
https://doi.org/10.1007/b136519change servers also provide message storage service in case that the receiver of these messages are offline, in which way, the communication becomes more simple and flexible. The experimental results show that our proposed system guarantees the strong tracking-resistance and high communication effic愤愤不平 发表于 2025-3-28 00:40:00
https://doi.org/10.1007/b136519formance hardware devices. And some methods require professional instruments such as oscilloscopes to collect fine-grained RF signals. For these reasons, we propose a lightweight clone detection method Anti-Clone. We combine convolutional neural networks (CNN) with transfer learning to combat data-c粗糙滥制 发表于 2025-3-28 03:41:06
https://doi.org/10.1007/b136519attach it on the chain. At the same time, the delay problem is added as a constraint to the trust calculation. Finally, the simulation experiment shows that the mechanism improves security of edge computing.aquatic 发表于 2025-3-28 07:33:31
https://doi.org/10.1007/b136519 with three models (SVM, CNN, etc.) and compared it with other popular schemes in the classification accuracy and training time. Our scheme proved to be efficient and practical, which achieved 2% better than the second one in model accuracy, costing merely 4% of its training time with the 0.05 priva祖传财产 发表于 2025-3-28 12:56:14
http://reply.papertrans.cn/23/2295/229415/229415_40.png