![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessSurvey: federated learning data security and privacy-preserving in edge-Internet of Things
The amount of data generated owing to the rapid development of the Smart Internet of Things is increasing exponentially. Traditional machine learning can no longer meet the requirements for training complex mo...
-
Chapter and Conference Paper
Improved ConvNeXt Facial Expression Recognition Embedded with Attention Mechanism
Facial expression recognition (FER) is an emerging and important research field in the field of pattern recognition, with wide applications in safe driving, intelligent monitoring, and human-computer interacti...
-
Chapter and Conference Paper
A Member Inference Attack Defense Method Based on Differential Privacy and Data Enhancement
The development of deep learning has brought about the business model of Machine Learning as a Service (MLaaS). Malicious users can infer whether a member has participated in model training through Membership ...
-
Article
Open AccessAccess control scheme based on blockchain and attribute-based searchable encryption in cloud environment
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...
-
Article
Open AccessMetabolomic analysis of aqueous humor reveals potential metabolite biomarkers for differential detection of macular edema
Macular edema (ME) is a major complication of retinal disease with multiple mechanisms involved in its development. This study aimed to investigate the metabolite profile of aqueous humor (AH) in patients with...
-
Chapter and Conference Paper
Research on User Influence Weighted Scoring Algorithm Incorporating Incentive Mechanism
Overall product ratings are an important basis for users when shop** online or using online services. However, some sellers and web service providers put a large amount of false rating data into the rating s...
-
Chapter and Conference Paper
Novel Ensemble Method Based on Improved k-nearest Neighbor and Gaussian Naive Bayes for Intrusion Detection System
The frequent occurrence of network intrusion events poses a challenge to the performance of intrusion detection systems. Generally, these events contain many unknown attacks, making it difficult for intrusion ...
-
Chapter and Conference Paper
A Review of Client Selection Mechanisms in Heterogeneous Federated Learning
Federated learning is a distributed machine learning approach that keeps data locally while achieving the utilization of fragmented data and protecting client privacy to a certain extent. However, the existenc...
-
Article
Open AccessDamage evolution and fracture behavior of different materials specimens containing a central hole subjected to local loading
The strength of the different materials specimens containing a central hole subjected to varying loading areas constitutes lots of underground engineering such as entry arrangement and mining process. In this ...
-
Chapter and Conference Paper
Adaptive Clustering by Fast Search and Find of Density Peaks
Clustering by fast search and find of density peaks is a new density-based clustering algorithm, which is widely used in various fields owing to its simplicity and efficiency, unique parameters, and recognitio...
-
Chapter and Conference Paper
A Differential Privacy Image Publishing Method Based on Wavelet Transform
Image is an important information-bearing medium with many important attributes. If the image data is released directly, personal privacy will be compromised. This paper aims at how to use the method of differ...
-
Chapter and Conference Paper
Robot Path Planning Method Based on Improved Grey Wolf Optimizer
Aiming at the shortcomings of the classical grey wolf optimizer in solving the path planning problem of mobile robots, such as low search efficiency and broken line turning, this paper proposes an improved Gre...
-
Chapter and Conference Paper
A High Performance Intrusion Detection System Using LightGBM Based on Oversampling and Undersampling
Intrusion detection system plays an important role in network security, however, the problem with data imbalance limits the detection ability of intrusion detection system. In order to improve the performance ...
-
Chapter and Conference Paper
Chain-AAFL: Chained Adversarial-Aware Federated Learning Framework
Federated learning (FL) distributes model training among multiple agents, who perform training locally but only exchange gradients due to privacy concerns. However, the threat of model poisoning attack and dee...
-
Article
Open AccessBehavior Reconstruction Models for Large-scale Network Service Systems
In large-scale network service systems, the phenomenon of instantaneous gathering of a large number of users can cause system abnormality, whenever the load imposed by the user behaviors does not match the sys...
-
Chapter and Conference Paper
Experimental Research on Internet Ecosystem and AS Hierarchy
The network architecture has undergone great changes. For example, the network topology of autonomous system level tends to be flattened. In this paper, actual network topology map is constructed through actua...
-
Chapter and Conference Paper
IDP - OPTICS: Improvement of Differential Privacy Algorithm in Data Histogram Publishing Based on Density Clustering
In recent years, incidents of privacy leaks have frequently occurred. How to protect the group and personal privacy has become a focus issue in the field of information security. Differential privacy technolog...
-
Chapter and Conference Paper
Research on Full Homomorphic Encryption Algorithm for Integer in Cloud Environment
With the continuous development of computer networks, cloud storage is now the mainstream way for people to store information, but some important information leaks in the process of storage, and information se...
-
Chapter and Conference Paper
An Incentive Compatible Mechanism for Lowest-Cost Routing
Routing incentives are the basis for Internet service providers (ISP) to provide efficient, stable, and lasting routing services. Aiming at the least-cost routing model in the User-customized Multipath Inter-...
-
Chapter and Conference Paper
Improved Digital Password Authentication Method for Android System
Proposes a simple digital password authentication method for mobile phones. Improves the authentication program by introducing random numbers and increasing the number of constant numbers. The input number of ...