UM

Browse/Search Results:  1-10 of 25 Help

Selected(0)Clear Items/Page:    Sort:
Incentive Mechanism Design for Electricity Data Trading With Data Valuation-Aware Contract Conference paper
Ma, Liya, Hui, Hongxun, Song, Yonghua. Incentive Mechanism Design for Electricity Data Trading With Data Valuation-Aware Contract[C]:IEEE Computer Society, 2024.
Authors:  Ma, Liya;  Hui, Hongxun;  Song, Yonghua
Favorite | TC[Scopus]:0 | Submit date:2024/11/05
Data Trading  Data Valuation  Incentive Mechanism  Trading Volume-reward Bundled Contract  Data Privacy  Renewable Energy Sources  Electricity  Data Integrity  Dispatching  Data Models  Real-time Systems  Power Systems  Contracts  Cost Accounting  
Privacy-Enhanced and Efficient Federated Knowledge Transfer Framework in IoT Journal article
Pan, Yanghe, Su, Zhou, Wang, Yuntao, Li, Ruidong, Wu, Yuan. Privacy-Enhanced and Efficient Federated Knowledge Transfer Framework in IoT[J]. IEEE Internet of Things Journal, 2024.
Authors:  Pan, Yanghe;  Su, Zhou;  Wang, Yuntao;  Li, Ruidong;  Wu, Yuan
Favorite | TC[Scopus]:0  IF:8.2/9.0 | Submit date:2024/10/10
Federated Learning  Knowledge Transfer  Data Models  Differential Privacy  Iot  
Cloud-Edge Collaborative Large Model Services: Challenges and Solutions Journal article
Pan Yanghe, Su Zhou, Wang Yuntao, Guo Shaolong, Liu Han, Li Ruidong, Wu Yuan. Cloud-Edge Collaborative Large Model Services: Challenges and Solutions[J]. IEEE Network, 2024.
Authors:  Pan Yanghe;  Su Zhou;  Wang Yuntao;  Guo Shaolong;  Liu Han; et al.
Favorite | TC[Scopus]:0  IF:6.8/8.5 | Submit date:2024/08/26
Adaptation Models  Artificial Intelligence  Cloud Computing  Cloud-edge Computing  Collaboration  Computational Modeling  Data Models  Data Privacy  Large Model  Task Analysis  
Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model Journal article
Li, Xin, Zhu, Guopu, Wang, Shen, Zhou, Yicong, Zhang, Xinpeng. Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34(7), 6391 - 6402.
Authors:  Li, Xin;  Zhu, Guopu;  Wang, Shen;  Zhou, Yicong;  Zhang, Xinpeng
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:8.3/7.1 | Submit date:2024/05/16
Circuits And Systems  Data Privacy  Feature Extraction  Generative Adversarial Network (Gan)  Generative Adversarial Networks  Generators  Image Color Analysis  Image Reconstruction  Image Restoration  Reverse Attack  Scale Invariant Feature Transform (Sift)  
Blockchain-FRL for Vehicular Lane Changing: Toward Traffic, Data, and Training Safety Journal article
Fan Bo, Dong Yiwei, Li Tongfei, Wu Yuan. Blockchain-FRL for Vehicular Lane Changing: Toward Traffic, Data, and Training Safety[J]. IEEE Internet of Things Journal, 2023, 10(24), 22153-22164.
Authors:  Fan Bo;  Dong Yiwei;  Li Tongfei;  Wu Yuan
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:8.2/9.0 | Submit date:2024/01/02
Blockchain  Data Privacy  Federated Reinforcement Learning (Frl)  Traffic Safety  Training Safety  Vehicular Lane Changing (Lc)  
China’s New Legislation on Personal Information Protection in Light of the Covid-19 Pandemic Journal article
Chao Wang, Taixia Shen. China’s New Legislation on Personal Information Protection in Light of the Covid-19 Pandemic[J]. Journal of International and Comparative Law, 2022, 9(2), 109 - 124.
Authors:  Chao Wang;  Taixia Shen
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:0.4/0 | Submit date:2022/08/30
Big Data Technology  China  Data Privacy  PAndemic Prevention And Control  Personal Data  Right To Privacy  
Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud Journal article
Ullah, Fasee, Pun, Chi Man. Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud[J]. IEEE Transactions on Computational Social Systems, 2022, 11(3), 3090-3107.
Authors:  Ullah, Fasee;  Pun, Chi Man
Favorite | TC[WOS]:4 TC[Scopus]:4  IF:4.5/4.6 | Submit date:2022/08/05
Auditing  Authenticator  Cloud Computing  Costs  Data Privacy  Dynamics  Error Identification  Organizations  Parity Bits  Privacy  Recovery  Security  Servers  Tag  Time Division Multiplexing  User Revocation.  
Sentiments and perceptions after a privacy breach incident Journal article
Lee, Chang Boon, Io, Hio Nam, Tang, Heng. Sentiments and perceptions after a privacy breach incident[J]. Cogent Business & Management, 2022, 9(1), 2050018.
Authors:  Lee, Chang Boon;  Io, Hio Nam;  Tang, Heng
Favorite | TC[WOS]:7 TC[Scopus]:5  IF:3.0/3.0 | Submit date:2022/05/17
Big Data  Privacy Breach  Sentiment Analysis  
澳門地區民法上個人信息保護權的體系定位 Journal article
唐曉晴, 吳奇琦. 澳門地區民法上個人信息保護權的體系定位[J]. 國家檢察官學院學報, 2021, 29(155), 75-89.
Authors:  唐曉晴;  吳奇琦
Adobe PDF | Favorite |  | Submit date:2022/08/23
个人资料保护法  Data Protection Law  个人信息保护法  Habeas Data  资讯自决权  Recht Auf Informationelle Selbstbestimmung  资讯自主权  Right To Informational Self-determination  资讯隐私权  Right To Informational Privacy  澳门民法  Macau Civil Law  
SmartDL: energy-aware decremental learning in a mobile-based federation for geo-spatial system Journal article
Wenting Zou, Li Li, Zichen Xu, Dan Wu, ChengZhong Xu, Yuhao Wang, Haoyang Zhu, Xiao Sun. SmartDL: energy-aware decremental learning in a mobile-based federation for geo-spatial system[J]. NEURAL COMPUTING & APPLICATIONS, 2021, 35(5), 3677–3696.
Authors:  Wenting Zou;  Li Li;  Zichen Xu;  Dan Wu;  ChengZhong Xu; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:4.5/4.7 | Submit date:2022/05/13
Data Privacy  Energy Management  Federated Learning  Mobile Computing