-
1
Privacy policy compliance detection and analysis based on knowledge graph
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
2
Social Computing and Social Intelligence
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
3
Named entity recognition based on span and category enhancement for Chinese news
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
4
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
5
Qualitative and quantitative knowledge of metasynthesis based on fuzzy system
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
6
Review: the application of deep reinforcement learning to quantitative trading in financial market
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
7
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
8
Review of communication optimization methods in federated learning
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
9
A new method for mining event influence propagation trees from spatio-temporal data
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
10
Instruction and demonstration-based secure service attribute generation mechanism for textual data
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
11
Robust identification method of website fingerprinting against disturbance
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
12
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
13
Self-adaptive fuzzing optimization method based on distribution divergence
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
14
Multiscale network alignment model based on convolution of homogeneous multilayer graphs
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
15
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
16
Detecting privacy compliance of mobile applications from the perspective of the "minimum necessary" principle
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
17
Label iteration-based clustering ensemble algorithm
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
18
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
19
Digital chefs and intelligent cooking systems based on multimodal large language model
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
20
Cerberus: cross-site social bot detection system based on deep learning
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article