不朽中国 发表于 2025-3-30 11:16:20

https://doi.org/10.1007/978-1-4612-3838-6cessary to protect location privacy. Most existing privacy-preserving methods are based on .-anonymous and .-segment diversity to construct an anonymous set, but lack consideration of the distribution of semantic location on the road segments. Thus, the number of various semantic location types in t

昏睡中 发表于 2025-3-30 14:35:11

John G. Stockner,Karen G. Porterignature with multiple indirect verifications (RS-MIV). This mechanism can ensure multiple and indirect verification of certificate signer identity while preserving its anonymity. On this basis, a supervisable anonymous management scheme was designed based on smart contracts, which realizes the anon

调味品 发表于 2025-3-30 17:07:51

http://reply.papertrans.cn/27/2631/263057/263057_53.png

骇人 发表于 2025-3-30 23:47:08

Stephen R. Carpenter,James F. Kitchellirst, Smart contracts appear as a set of computer codes, and carry the mutual consensus of the transaction parties and under the principle of freedom of contract form. Thus, smart contracts can be understood as a type of contractual written form in the high-tech context. Then the agreement automatic

一小块 发表于 2025-3-31 01:57:54

http://reply.papertrans.cn/27/2631/263057/263057_55.png

碎石头 发表于 2025-3-31 07:15:45

http://reply.papertrans.cn/27/2631/263057/263057_56.png

安慰 发表于 2025-3-31 12:59:12

D. D. Romashchenko,K. Yu. Bulgakovng each proposal of ABC, a great number of simulators are required and each simulation is always time-consuming. The overall goal of this work is to avoid inefficient computational cost of ABC. A pre-judgment rule (PJR) is proposed, which mainly aims to judge the acceptance condition using a small f

他去就结束 发表于 2025-3-31 13:32:27

Gaetano Lo Bue,Fabrizio Margheritinidifficult for users to understand. Adversarial example attack is a unique form of attack in deep learning. The attacker attacks the model by applying invisible changes to the picture, affecting the results of the model judgment. In this paper, a research is implemented on the adversarial example att

落叶剂 发表于 2025-3-31 17:47:42

Dinshaw N. Pardiwala,Sanjay Soni,Alhad Rautesfor prediction tasks. However, in structured data, ignorance of low-order features may cause the low prediction rate. To address this issue, in this paper, deeper attention-based network (DAN) is proposed. With DAN method, to keep both low- and high-order features, attention average pooling layer

UTTER 发表于 2025-4-1 01:02:41

General Model for Index Recommendation Based on Convolutional Neural Networkto be solved. In this paper, a fine-grained classification model based on multi-core convolution neural network (CNNIR) is proposed to implement the transferable IR model. Using the strong knowledge representation ability of convolution network, CNNIR achieves the effective knowledge representation
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data Science; 6th International Co Jianchao Zeng,Weipeng Jing,Zeguang Lu Conference proceedings 2020 Springer Nature Singapore Pte Ltd. 202