From post

When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System.

, , , , , , и . DASFAA (1), том 10177 из Lecture Notes in Computer Science, стр. 576-591. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing., , , , , , и . Quantum Inf. Process., 20 (7): 1-12 (2021)IoT-Based Information System on Cold-Chain Logistics Service Quality (ICCLSQ) Management in Logistics 4.0., , , и . Inf. Syst. Frontiers, 26 (2): 689-708 (апреля 2024)A Transformer-Assisted Cascade Learning Network for Choroidal Vessel Segmentation., , , , , , , , и . J. Comput. Sci. Technol., 39 (2): 286-304 (марта 2024)Beauty is Attractive: Moduli Trapping at Enhanced Symmetry Points, , , , , и . (2004)cite arxiv:hep-th/0403001 Comment: 50 pages, 4 figures; v2: added references and an appendix describing a related classical process.Implementation of back-stepping integral controller for a gesture driven quad-copter with human detection and auto follow feature., и . CSCESM, стр. 134-138. IEEE, (2015)Inverse Models for Estimating the Initial Condition of Spatio-Temporal Advection-Diffusion Processes., и . Technometrics, 65 (3): 432-445 (июля 2023)Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory., , , , и . IEEE Trans. Serv. Comput., 9 (2): 186-198 (2016)Attributes Reduction Based on GA-CFS Method., , , , , и . APWeb/WAIM, том 4505 из Lecture Notes in Computer Science, стр. 868-875. Springer, (2007)Trajectory Design and Power Control for Multi-UAV Assisted Wireless Networks: A Machine Learning Approach., , , и . IEEE Trans. Veh. Technol., 68 (8): 7957-7969 (2019)Applying Code Quality Detection in Online Programming Judge., и . ICIIT, стр. 56-60. ACM, (2020)