UM

Browse/Search Results:  1-10 of 88 Help

Selected(0)Clear Items/Page:    Sort:
trategic Responses to Personalized Pricing and Demand for Privacy: An Experiment Journal article
INACIO GUERBEROFF LANARI BO, Li Chen, Rustamdjan Hakimov. trategic Responses to Personalized Pricing and Demand for Privacy: An Experiment[J]. Games and Economic Behavior, 2024, 148, 487–516.
Authors:  INACIO GUERBEROFF LANARI BO;  Li Chen;  Rustamdjan Hakimov
Adobe PDF | Favorite | TC[Scopus]:0  IF:1.0/1.2 | Submit date:2024/11/14
Price Discrimination  Personalized Pricing  Strategic Behavior  Privacy  Experiments  
Incentive Mechanism Design for Electricity Data Trading With Data Valuation-Aware Contract Conference paper
Ma, Liya, Hui, Hongxun, Song, Yonghua. Incentive Mechanism Design for Electricity Data Trading With Data Valuation-Aware Contract[C]:IEEE Computer Society, 2024.
Authors:  Ma, Liya;  Hui, Hongxun;  Song, Yonghua
Favorite | TC[Scopus]:0 | Submit date:2024/11/05
Data Trading  Data Valuation  Incentive Mechanism  Trading Volume-reward Bundled Contract  Data Privacy  Renewable Energy Sources  Electricity  Data Integrity  Dispatching  Data Models  Real-time Systems  Power Systems  Contracts  Cost Accounting  
Distributed Self-Triggered Privacy-Preserving Secondary Control of VSG-Based AC Microgrids Journal article
Huang, Xing, Qi, Donglian, Chen, Yulin, Yan, Yunfeng, Yang, Shaohua, Wang, Yaxin, Wang, Xianbo. Distributed Self-Triggered Privacy-Preserving Secondary Control of VSG-Based AC Microgrids[J]. IEEE Transactions on Smart Grid, 2024.
Authors:  Huang, Xing;  Qi, Donglian;  Chen, Yulin;  Yan, Yunfeng;  Yang, Shaohua; et al.
Favorite | TC[Scopus]:0  IF:8.6/9.6 | Submit date:2024/10/10
Privacy-preserving Algorithm  Virtual Synchronous Generator  Self-triggered Mechanism  Distributed Control  Microgrids  
Privacy-Enhanced and Efficient Federated Knowledge Transfer Framework in IoT Journal article
Pan, Yanghe, Su, Zhou, Wang, Yuntao, Li, Ruidong, Wu, Yuan. Privacy-Enhanced and Efficient Federated Knowledge Transfer Framework in IoT[J]. IEEE Internet of Things Journal, 2024.
Authors:  Pan, Yanghe;  Su, Zhou;  Wang, Yuntao;  Li, Ruidong;  Wu, Yuan
Favorite | TC[Scopus]:0  IF:8.2/9.0 | Submit date:2024/10/10
Federated Learning  Knowledge Transfer  Data Models  Differential Privacy  Iot  
Cloud-Edge Collaborative Large Model Services: Challenges and Solutions Journal article
Pan Yanghe, Su Zhou, Wang Yuntao, Guo Shaolong, Liu Han, Li Ruidong, Wu Yuan. Cloud-Edge Collaborative Large Model Services: Challenges and Solutions[J]. IEEE Network, 2024.
Authors:  Pan Yanghe;  Su Zhou;  Wang Yuntao;  Guo Shaolong;  Liu Han; et al.
Favorite | TC[Scopus]:0  IF:6.8/8.5 | Submit date:2024/08/26
Adaptation Models  Artificial Intelligence  Cloud Computing  Cloud-edge Computing  Collaboration  Computational Modeling  Data Models  Data Privacy  Large Model  Task Analysis  
Privacy-Preserving Control for 2-D Systems With Guaranteed Probability Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Han, Qing-Long. Privacy-Preserving Control for 2-D Systems With Guaranteed Probability[J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54(8), 4999-5011.
Authors:  Zhu, Kaiqun;  Wang, Zidong;  Ding, Derui;  Dong, Hongli;  Han, Qing-Long
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:8.6/8.7 | Submit date:2024/10/09
Dynamic Coding-decoding Rule  Guaranteed Probability  Privacy-preserving Mechanism (Ppm)  Two-dimensional (2-d) Systems  
CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition Journal article
Wang, Yifan, Gui, Jie, Tang, Yuan Yan, Kwok, James T.. CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 7810-7823.
Authors:  Wang, Yifan;  Gui, Jie;  Tang, Yuan Yan;  Kwok, James T.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:6.3/7.3 | Submit date:2024/09/03
Cancelable Biomrtrics  Finger Vein Recognition  Convolutional Neural Network  Object Localization  Plug-and-play  Template Protection  Security And Privacy  
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:  Liu, Jun;  Zhou, Jiantao;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:5.2/4.9 | Submit date:2024/06/05
Deep Neural Networks  Encryption  Image Classification  Privacy-preserving  
Impartial Adversarial Distillation: Addressing Biased Data-Free Knowledge Distillation via Adaptive Constrained Optimization Conference paper
Liao, Donping, Gao, Xitong, Xu, Chengzhong. Impartial Adversarial Distillation: Addressing Biased Data-Free Knowledge Distillation via Adaptive Constrained Optimization[C], 2024, 3342-3350.
Authors:  Liao, Donping;  Gao, Xitong;  Xu, Chengzhong
Favorite | TC[Scopus]:0 | Submit date:2024/05/16
Cv: Bias  Fairness & Privacy  Cv: Applications  
Progressive Poisoned Data Isolation for Training-Time Backdoor Defense Conference paper
Chen, Yiming, Wu, Haiwei, Zhou, Jiantao. Progressive Poisoned Data Isolation for Training-Time Backdoor Defense[C], 2024, 11425-11433.
Authors:  Chen, Yiming;  Wu, Haiwei;  Zhou, Jiantao
Favorite | TC[Scopus]:2 | Submit date:2024/05/16
Ml: Privacy