-
1
Federated Reinforcement Learning in Stock Trading Execution: The FPPO Algorithm for Information Security
Published 2025-01-01Subjects: Get full text
Article -
2
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
Published 2022-09-01Subjects: Get full text
Article -
3
Security and Privacy in Metaverse: A Comprehensive Survey
Published 2023-06-01Subjects: Get full text
Article -
4
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01Subjects: Get full text
Article -
5
Enhancing privacy and traceability of public health insurance claim system using blockchain technology
Published 2025-02-01Subjects: Get full text
Article -
6
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: Get full text
Article -
7
Two new nonrandomized response models for surveys on sensitive topics
Published 2025-01-01Subjects: Get full text
Article -
8
A Digital Twin Comprehensive Monitoring System for Ship Equipment
Published 2024-12-01Subjects: Get full text
Article -
9
Reversible data hiding in encrypted images with high payload
Published 2022-07-01Subjects: Get full text
Article -
10
A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
11
FSPPCFs: a privacy-preserving collaborative filtering recommendation scheme based on fuzzy C-means and Shapley value
Published 2024-12-01Subjects: “…Privacy protection…”
Get full text
Article -
12
Privacy policy compliance detection and analysis based on knowledge graph
Published 2024-12-01Subjects: Get full text
Article -
13
Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures
Published 2025-01-01Subjects: Get full text
Article -
14
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Subjects: Get full text
Article -
15
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Published 2025-01-01Subjects: Get full text
Article -
16
Evaluation of EGFR-TKIs and ICIs treatment stratification in non-small cell lung cancer using an encrypted multidimensional radiomics approach
Published 2025-01-01Subjects: Get full text
Article -
17
Cross-Chain Identity Authentication Method Based on Relay Chain
Published 2025-01-01Subjects: Get full text
Article