[PDF][PDF] 前瞻性雲端安全儲存, 防護, 行為分析與觀測平台---子計畫一: 支援多樣功能之雲端資料安全儲存(II)

曾文貴 - 2011 - ir.lib.nycu.edu.tw
… of: (1) privacy preserving cloud intrusion detection system; (2… 字搜尋的加密系 統,以及privacy
preserving data mining技 術.在… 特殊的加密系統 (fully homomorphic encryption)來對加密中 的…

利用分散式正規表式比對保護URL 檢查之隱私

KH Lai - 國立臺灣大學資訊工程學系學位論文, 2023 - airitilibrary.com
privacy issue becomes more and more important. Therefore, we propose a privacy-preserving
URL into secret shares to protect the user's privacy. Our system utilizes several computing …

面向非独立同分布数据的自适应联邦深度学习算法

张泽辉, 李庆丹, 富瑶, 何宁昕, 高铁杠 - 自动化学报, 2023 - aas.net.cn
… used to construct a hybrid privacy-preserving scheme based on chaos system and homomorphic
encryption, thereby further improving the privacy protection level. Theoretical analysis …

云计算中图像数据处理的隐私保护

任奎 - 网络与信息安全学报, 2016 - infocomm-journal.com
… technical challenges lain in privacy-preserving image processing based … homomorphic
encryption (HE) scheme, secure multiparty computation (SMC) protocol, and differential privacy (…

利用分散式正規表式比對保護URL 檢查之隱私

賴侃軒 - 2023 - tdr.lib.ntu.edu.tw
… [24] proposed a privacy preserving search for chemical compound databases with fuzzy
matching based on Tversky index. All the above solutions are special-case solutions and are …

网络安全遇上人工智能: 综述

J Li, AJ Li - Frontiers, 2018 - jzus.zju.edu.cn
Intrusion detection using deep belief network and probabilistic neural network. IEEE Int
Conf on Computational Science and Engineering and IEEE Int Conf on Embedded and …

應用同形保密技術於社群適地性行動雲端服務之研究

魯旺, 王蒞君 - 2010 - ir.lib.nycu.edu.tw
… Our proposed homomorphic encryption scheme for mobile clients can relieve the heavy … of
using homomorphic encryption as a solution for all applications is the level of homomorphism

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
Intrusion Detection System (IDS) using a supervised learning method of ML to distinguish
between malicious or benign network activity and to detectdetection, privacy preservation, and …

[HTML][HTML] 两层传感器网络中隐私保护的等区间近似查询算法

王涛春, 崔壮壮, 刘盈 - 计算机应用, 2017 - m.fx361.com
… A survey of intrusion detection systems in wireless sensor … Privacy preservation, a key factor
in expanding the application … of the privacy of sensory data in WSN, Privacy-preserving Equal…

隐私保护的加密流量检测研究

张心语, 张秉晟, 孟泉润, 任奎 - 网络与信息安全学报, 2021 - infocomm-journal.com
encrypted traffic detection technologies lack privacy protection for data and models, which
will violate the privacy preserving … 方向:基于同态加密(homomorphic encryption),安全多方计算(…