找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Collaborative Computing: Networking, Applications and Worksharing; 18th EAI Internation Honghao Gao,Xinheng Wang,Tasos Dagiuklas Conference

[复制链接]
楼主: 灰尘
发表于 2025-3-26 20:58:55 | 显示全部楼层
A Visual Tool for Interactively Privacy Analysis and Preservation on Order-Dynamic Tabular Data adjustment. Novel visual designs, i.e., data abstract, risk tree, integrated privacy enhancement, are developed to explore data correlations and acquire privacy awareness. We demonstrate TPA’s effectiveness with a case study on the prototype and qualitatively discuss the pros and cons with domain experts for future improvement.
发表于 2025-3-27 02:23:15 | 显示全部楼层
发表于 2025-3-27 07:01:05 | 显示全部楼层
An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identificationtures of IoT traffic, which is able to automatically extract the high-level features from raw IoT traffic. The further evaluation indicates that our method is capable of identifying diverse IoT devices with satisfactory accuracy.
发表于 2025-3-27 10:26:25 | 显示全部楼层
Research on Depth-Adaptive Dual-Arm Collaborative Grasping Methodd pixel information. Finally, the task is assigned to the left and right robotic arms, and the target grabbing task is realized based on the main-auxiliary control. The proposed approach is validated in multiple experiments on a Baxter robot under different conditions.
发表于 2025-3-27 15:38:41 | 显示全部楼层
https://doi.org/10.1007/b136519ng the privacy information of victims while maintaining the accuracy of the global model. Comprehensive experimental results demonstrated that our method is effective in the prevention of GAN-based privacy inferring attacks.
发表于 2025-3-27 19:53:57 | 显示全部楼层
https://doi.org/10.1007/b136519change servers also provide message storage service in case that the receiver of these messages are offline, in which way, the communication becomes more simple and flexible. The experimental results show that our proposed system guarantees the strong tracking-resistance and high communication effic
发表于 2025-3-28 00:40:00 | 显示全部楼层
https://doi.org/10.1007/b136519formance hardware devices. And some methods require professional instruments such as oscilloscopes to collect fine-grained RF signals. For these reasons, we propose a lightweight clone detection method Anti-Clone. We combine convolutional neural networks (CNN) with transfer learning to combat data-c
发表于 2025-3-28 03:41:06 | 显示全部楼层
https://doi.org/10.1007/b136519attach it on the chain. At the same time, the delay problem is added as a constraint to the trust calculation. Finally, the simulation experiment shows that the mechanism improves security of edge computing.
发表于 2025-3-28 07:33:31 | 显示全部楼层
https://doi.org/10.1007/b136519 with three models (SVM, CNN, etc.) and compared it with other popular schemes in the classification accuracy and training time. Our scheme proved to be efficient and practical, which achieved 2% better than the second one in model accuracy, costing merely 4% of its training time with the 0.05 priva
发表于 2025-3-28 12:56:14 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-29 07:20
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表