Differential privacy data publishing in the big data platform of precise poverty alleviation
暂无分享,去创建一个
[1] Fangqi Chen,et al. Existence and multiplicity of nontrivial solutions for nonlinear fractional differential systems with p‐Laplacian via critical point theory , 2018 .
[2] Christos Dimitrakakis,et al. Differential Privacy for Bayesian Inference through Posterior Sampling , 2017, J. Mach. Learn. Res..
[3] Cun-Qiang Miao,et al. Computing eigenpairs in augmented Krylov subspace produced by Jacobi-Davidson correction equation , 2018, J. Comput. Appl. Math..
[4] Laith Mohammad Abualigah,et al. APPLYING GENETIC ALGORITHMS TO INFORMATION RETRIEVAL USING VECTOR SPACE MODEL , 2015 .
[5] Jemal H. Abawajy,et al. Privacy models for big data: a survey , 2015, Int. J. Big Data Intell..
[6] David Eckhoff,et al. Metrics : a Systematic Survey , 2018 .
[7] Philip J. Withers,et al. Reliability of Algorithms Interpreting Topological and Geometric Properties of Porous Media for Pore Network Modelling , 2019, Transport in Porous Media.
[8] Lixia Huang,et al. Study on the Sustainable Development of Targeted Poverty Alleviation through Financial Support , 2018 .
[9] Essam Said Hanandeh,et al. A novel hybridization strategy for krill herd algorithm applied to clustering techniques , 2017, Appl. Soft Comput..
[10] Cong Sun,et al. SRDPV: secure route discovery and privacy-preserving verification in MANETs , 2019, Wirel. Networks.
[11] Kelly D. Martin,et al. The role of data privacy in marketing , 2016, Journal of the Academy of Marketing Science.
[12] Laith Mohammad Abualigah,et al. A combination of objective functions and hybrid Krill herd algorithm for text document clustering analysis , 2018, Eng. Appl. Artif. Intell..
[13] Eran Toch,et al. Privacy by designers: software developers’ privacy mindset , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[14] Laith Mohammad Abualigah,et al. Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering , 2017, The Journal of Supercomputing.
[15] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[16] Zhe Xia,et al. Privacy-preserving raw data collection without a trusted authority for IoT , 2019, Comput. Networks.
[17] J. Bao,et al. Targeted poverty alleviation in China: segmenting small tourism entrepreneurs and effectively supporting them , 2018, Journal of Sustainable Tourism.
[18] C. Jiang,et al. Synchronization and antisynchronization of N‐coupled fractional‐order complex chaotic systems with ring connection , 2018 .
[19] Ulrich Meyer,et al. From Big Data to Big Artificial Intelligence? , 2017, KI - Künstliche Intelligenz.
[20] Jiqiang Liu,et al. Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters , 2018, IEEE Transactions on Smart Grid.
[21] Laith Mohammad Abualigah,et al. Hybrid clustering analysis using improved krill herd algorithm , 2018, Applied Intelligence.
[22] Robert W. Palmatier,et al. Data Privacy: Effects on Customer and Firm Performance , 2017 .
[23] Anabel Quan-Haase,et al. Privacy and Data Management: The User and Producer Perspectives , 2018, American Behavioral Scientist.
[24] M. Gunasekaran,et al. Effective Big Data Retrieval Using Deep Learning Modified Neural Networks , 2019, Mob. Networks Appl..
[25] D. Nelson,et al. The limits of poverty reduction in support of climate change adaptation , 2016 .
[26] Wei Li,et al. Towards IP geolocation with intermediate routers based on topology discovery , 2019, Cybersecur..
[27] Jin Wang,et al. Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy Protection , 2018, MUE/FutureTech.
[28] Laith Mohammad Abualigah,et al. Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering , 2018, Studies in Computational Intelligence.
[29] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[30] Ravindra S. Hegadi,et al. Unconstrained face detection: a Deep learning and Machine learning combined approach , 2017, CSI Transactions on ICT.
[31] Wolfgang Kerber,et al. Digital Markets, Data, and Privacy: Competition Law, Consumer Law, and Data Protection , 2016 .
[32] Feng Liu,et al. Rough maximal functions supported by subvarieties on Triebel–Lizorkin spaces , 2018 .
[33] Christopher Nemeth,et al. Control variates for stochastic gradient MCMC , 2017, Statistics and Computing.