Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of the Knowledge Economy"
DOI: 10.1007/s13132-017-0476-y
Abstract: Along with China’s housing boom, customer information leakage becomes a serious problem. To seek solutions, authors proposed a novel management framework based on theoretical analysis and literature review. Furthermore, questionnaires with items about customer information…
read more here.
Keywords:
management;
information;
information leakage;
customer information ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Chinese Journal of Electronics"
DOI: 10.1049/cje.2021.07.009
Abstract: Electromagnetic emissions from electrical information equipment may contain useful information and lead to information leakage. In order to detect the electromagnetic information leakage of digital video cable, a rapid testing method for computer video information…
read more here.
Keywords:
video;
information;
cable;
electromagnetic information ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Kybernetes"
DOI: 10.1108/k-07-2016-0178
Abstract: Purpose Any computing architecture cannot be designed with complete confidentiality. As a result, at any point, it may leak the information. So, it is important to decide leakage threshold in any computing architecture. To prevent…
read more here.
Keywords:
information;
leakage;
web services;
based web ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2877792
Abstract: Named data networking (NDN) has emerged as a future networking architecture having the potential to replace the Internet. In order to do so, the NDN needs to cope with inherent problems of the Internet, such…
read more here.
Keywords:
information;
named data;
leakage;
data networking ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2019.2897874
Abstract: By learning generative models of semantic-rich data distributions from samples, generative adversarial network (GAN) has recently attracted intensive research interests due to its excellent empirical performance as a generative model. The model is used to…
read more here.
Keywords:
gan;
differential privacy;
information leakage;
privacy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Computational Intelligence and Neuroscience"
DOI: 10.1155/2022/1926794
Abstract: The rapid iteration of information technology makes the development of online social networks increasingly rapid, and its corresponding network scale is also increasingly large and complex. The corresponding algorithms to deal with social networks and…
read more here.
Keywords:
information;
article;
network;
algorithm ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Statistical Software"
DOI: 10.18637/jss.v085.i13
Abstract: Data driven machine learning for predictive modeling problems (classification, regression, or survival analysis) typically involves a number of steps beginning with data preprocessing and ending with performance evaluation. A large number of packages providing tools…
read more here.
Keywords:
package;
evaluation;
performance;
information leakage ... See more keywords