您当前的位置:
首页 >
文章列表页 >
Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
Papers | 更新时间:2024-09-10
    • Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram

    • Journal on Communications   Vol. 45, Issue 8, Pages: 1-19(2024)
    • DOI:10.11959/j.issn.1000-436x.2024122    

      CLC: TN92
    • Received:23 February 2024

      Revised:2024-06-11

      Published:25 August 2024

    移动端阅览

  • TIAN Yuechi,LI Fenghua,ZHOU Zejun,et al.Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram[J].Journal on Communications,2024,45(08):1-19. DOI: 10.11959/j.issn.1000-436x.2024122.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1110

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Personalized trajectory privacy protection method based on fuzzy sensitivity quantification in MEC
Trajectory reconstruction attacks on differential privacy based on a CNN-BiLSTM-Attention hybrid model
Federated learning with differential privacy recalibration for dynamic computing nodes
DAGUARD: distributed backdoor attack defense scheme under federated learning
AdaBoost algorithm based on target perturbation

Related Author

Jiang Zhongyuan
Fang Mengxin
Wang Qizhou
Ma Jianfeng
Li Xinghua
XIE Lixia
ZHAO Erkang
YANG Hongyu

Related Institution

School of Telecommunication, Xi’an Jiaotong University
Purple Mountain Laboratories
School of Cyber Engineering, Xidian University
School of Computer Science and Engineering, Tianjin University of Technology
College of Cyber Science, Nankai University
0