-
1
Research on privacy-preserving learning machines
Published 2016-06-01Subjects: “…privacy preservation…”
Get full text
Article -
2
Traffic characteristic based privacy leakage assessment scheme for Android device
Published 2020-02-01Subjects: Get full text
Article -
3
Research on privacy protection in the process of information exchange
Published 2016-03-01Subjects: Get full text
Article -
4
Privacy-preserving image processing in cloud computing
Published 2016-01-01Subjects: Get full text
Article -
5
Differentially private data release based on clustering anonymization
Published 2016-05-01Subjects: Get full text
Article -
6
State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks
Published 2018-10-01Subjects: “…privacy preservation…”
Get full text
Article -
7
Survey of trustworthy pervasive social networking
Published 2016-02-01Subjects: Get full text
Article -
8
Multi-party summation query method based on differential privacy
Published 2020-06-01Subjects: Get full text
Article -
9
Location privacy preservation approach towards to content sharing on mobile online social network
Published 2016-11-01Subjects: Get full text
Article -
10
Privacy-preserving scheme for logistics systems based on 2D code and information hiding
Published 2017-11-01Subjects: Get full text
Article -
11
Research on outsourcing of digital image forensics based on privacy preserving
Published 2016-08-01Subjects: “…privacy preservation…”
Get full text
Article -
12
Survey of the context-aware location privacy-preserving techniques
Published 2013-08-01Subjects: Get full text
Article -
13
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01Subjects: Get full text
Article -
14
A review of network traffic analysis targeting mobile devices
Published 2018-04-01Subjects: Get full text
Article -
15
Image privacy preservation scheme based on QR code and reversible visible watermarking
Published 2019-11-01Subjects: Get full text
Article -
16
Privacy-utility tradeoff method using multi-variable source coding
Published 2015-12-01Subjects: “…privacy preservation…”
Get full text
Article -
17
Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE
Published 2019-11-01Subjects: “…privacy preservation…”
Get full text
Article -
18
Prospect of secure-efficient search and privacy-preserving mechanism on big data
Published 2016-04-01Subjects: Get full text
Article -
19
Survey on data preserving for the search of internet of things
Published 2016-09-01Subjects: Get full text
Article -
20
Privacy self-correlation privacy-preserving scheme in LBS
Published 2019-05-01Subjects: Get full text
Article