UM

Browse/Search Results:  1-10 of 25 Help

Selected(0)Clear Items/Page:    Sort:
Incentive Mechanism Design for Electricity Data Trading With Data Valuation-Aware Contract Conference paper
Ma, Liya, Hui, Hongxun, Song, Yonghua. Incentive Mechanism Design for Electricity Data Trading With Data Valuation-Aware Contract[C]:IEEE Computer Society, 2024, 203130.
Authors:  Ma, Liya;  Hui, Hongxun;  Song, Yonghua
Favorite | TC[Scopus]:0 | Submit date:2024/11/05
Data Trading  Data Valuation  Incentive Mechanism  Trading Volume-reward Bundled Contract  Data Privacy  Renewable Energy Sources  Electricity  Data Integrity  Dispatching  Data Models  Real-time Systems  Power Systems  Contracts  Cost Accounting  
Privacy-Enhanced and Efficient Federated Knowledge Transfer Framework in IoT Journal article
Pan, Yanghe, Su, Zhou, Wang, Yuntao, Li, Ruidong, Wu, Yuan. Privacy-Enhanced and Efficient Federated Knowledge Transfer Framework in IoT[J]. IEEE Internet of Things Journal, 2024.
Authors:  Pan, Yanghe;  Su, Zhou;  Wang, Yuntao;  Li, Ruidong;  Wu, Yuan
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:8.2/9.0 | Submit date:2024/10/10
Federated Learning  Knowledge Transfer  Data Models  Differential Privacy  Iot  
Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model Journal article
Li, Xin, Zhu, Guopu, Wang, Shen, Zhou, Yicong, Zhang, Xinpeng. Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34(7), 6391 - 6402.
Authors:  Li, Xin;  Zhu, Guopu;  Wang, Shen;  Zhou, Yicong;  Zhang, Xinpeng
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:8.3/7.1 | Submit date:2024/05/16
Circuits And Systems  Data Privacy  Feature Extraction  Generative Adversarial Network (Gan)  Generative Adversarial Networks  Generators  Image Color Analysis  Image Reconstruction  Image Restoration  Reverse Attack  Scale Invariant Feature Transform (Sift)  
Safeguarding the Unseen: a Study on Data Privacy in DeFi Protocols Journal article
Zhuangtong Huang, Jiawei Zhu, Zhongyu Huang, Yixin Xu, Jerome Yen, WANG YE. Safeguarding the Unseen: a Study on Data Privacy in DeFi Protocols[J]. Blockchain, 2023, 1(2).
Authors:  Zhuangtong Huang;  Jiawei Zhu;  Zhongyu Huang;  Yixin Xu;  Jerome Yen; et al.
Favorite |  | Submit date:2025/01/17
Blockchain  Decentralized Finance  Data Privacy  
Blockchain-FRL for Vehicular Lane Changing: Toward Traffic, Data, and Training Safety Journal article
Fan Bo, Dong Yiwei, Li Tongfei, Wu Yuan. Blockchain-FRL for Vehicular Lane Changing: Toward Traffic, Data, and Training Safety[J]. IEEE Internet of Things Journal, 2023, 10(24), 22153-22164.
Authors:  Fan Bo;  Dong Yiwei;  Li Tongfei;  Wu Yuan
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:8.2/9.0 | Submit date:2024/01/02
Blockchain  Data Privacy  Federated Reinforcement Learning (Frl)  Traffic Safety  Training Safety  Vehicular Lane Changing (Lc)  
China’s New Legislation on Personal Information Protection in Light of the Covid-19 Pandemic Journal article
Chao Wang, Taixia Shen. China’s New Legislation on Personal Information Protection in Light of the Covid-19 Pandemic[J]. Journal of International and Comparative Law, 2022, 9(2), 109 - 124.
Authors:  Chao Wang;  Taixia Shen
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:0.4/0 | Submit date:2022/08/30
Big Data Technology  China  Data Privacy  PAndemic Prevention And Control  Personal Data  Right To Privacy  
Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud Journal article
Ullah, Fasee, Pun, Chi Man. Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud[J]. IEEE Transactions on Computational Social Systems, 2022, 11(3), 3090-3107.
Authors:  Ullah, Fasee;  Pun, Chi Man
Favorite | TC[WOS]:4 TC[Scopus]:4  IF:4.5/4.6 | Submit date:2022/08/05
Auditing  Authenticator  Cloud Computing  Costs  Data Privacy  Dynamics  Error Identification  Organizations  Parity Bits  Privacy  Recovery  Security  Servers  Tag  Time Division Multiplexing  User Revocation.  
Sentiments and perceptions after a privacy breach incident Journal article
Lee, Chang Boon, Io, Hio Nam, Tang, Heng. Sentiments and perceptions after a privacy breach incident[J]. Cogent Business & Management, 2022, 9(1), 2050018.
Authors:  Lee, Chang Boon;  Io, Hio Nam;  Tang, Heng
Favorite | TC[WOS]:7 TC[Scopus]:6  IF:3.0/3.0 | Submit date:2022/05/17
Big Data  Privacy Breach  Sentiment Analysis  
澳門地區民法上個人信息保護權的體系定位 Journal article
唐曉晴, 吳奇琦. 澳門地區民法上個人信息保護權的體系定位[J]. 國家檢察官學院學報, 2021, 29(155), 75-89.
Authors:  唐曉晴;  吳奇琦
Adobe PDF | Favorite |  | Submit date:2022/08/23
个人资料保护法  Data Protection Law  个人信息保护法  Habeas Data  资讯自决权  Recht Auf Informationelle Selbstbestimmung  资讯自主权  Right To Informational Self-determination  资讯隐私权  Right To Informational Privacy  澳门民法  Macau Civil Law  
SmartDL: energy-aware decremental learning in a mobile-based federation for geo-spatial system Journal article
Wenting Zou, Li Li, Zichen Xu, Dan Wu, ChengZhong Xu, Yuhao Wang, Haoyang Zhu, Xiao Sun. SmartDL: energy-aware decremental learning in a mobile-based federation for geo-spatial system[J]. NEURAL COMPUTING & APPLICATIONS, 2021, 35(5), 3677–3696.
Authors:  Wenting Zou;  Li Li;  Zichen Xu;  Dan Wu;  ChengZhong Xu; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:4.5/4.7 | Submit date:2022/05/13
Data Privacy  Energy Management  Federated Learning  Mobile Computing