| [1] |
XUE Wenxue, XIE Yingde.
Privacy-preservation Models for Identifying Financial Fraud in Enterprises
[J]. Computer and Modernization, 2025, 0(06): 16-20.
|
| [2] |
YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2.
Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection
[J]. Computer and Modernization, 2024, 0(05): 46-54.
|
| [3] |
YANG Ju, DENG Zhiliang, YANG Zhiqiang, WANG Yan, ZHAO Zhongyuan.
Decentralized Federation Learning Based on Fed-DPDOBO
[J]. Computer and Modernization, 2024, 0(04): 99-106.
|
| [4] |
AO Bochao, FAN Bingbing.
Federated Learning Aggregation Algorithm Based on AP Clustering Algorithm
[J]. Computer and Modernization, 2024, 0(04): 5-11.
|
| [5] |
ZHA Kai-jin, WANG Zhi-bo, HE Yue-shun, XU Hong-zhen.
Survey on Blockchain Security Protection
[J]. Computer and Modernization, 2023, 0(06): 110-117.
|
| [6] |
FENG Li-gang, ZHU You-wen, .
Utility-optimized Local Differential Privacy Mechanism for Protecting Location Privacy
[J]. Computer and Modernization, 2022, 0(09): 99-105.
|
| [7] |
ZHANG Tian-xi, WANG Li-peng, ZHOU Chun-tian, YANG Yan-yan, LI Xiao-chong.
Secret Content Auditing Scheme in Internet of Things Scenes Based on Blockchain
[J]. Computer and Modernization, 2022, 0(03): 30-36.
|
| [8] |
ZHAO Long, LONG Shi-gong, .
Crowdsourcing Privacy Protection Method to Local Differential Privacy
[J]. Computer and Modernization, 2021, 0(07): 115-119.
|
| [9] |
ZUO Peng, HE Zhi-mou, YUAN Meng, ZHANG Hai-kuo, YANG Wei-ping.
Identifier Resolution Model Based on Encryption Transmission
[J]. Computer and Modernization, 2020, 0(04): 46-.
|
| [10] |
SHANG Jing-wei1,2, JIANG Rong1,2, HU Xiao-han1,2, SHI Ming-yue1,2.
Medical Big Data and Privacy Leakage
[J]. Computer and Modernization, 2019, 0(07): 111-.
|
| [11] |
CHEN Yang, YU Shoujian.
Research on Differential Privaty for Decision Tree Release Technology
[J]. Computer and Modernization, 2017, 0(3): 59-.
|
| [12] |
LIU Bo, HUANG Zhi-qiu, WANG Shan-shan.
A Method of Service Evolution for Controlling Risk of Privacy Exposure
[J]. Computer and Modernization, 2014, 0(10): 76-80,107.
|
| [13] |
ZHANG Xing-lan;YU Jin-ying.
Strategy for Privacy Protection of Supporting Data Modification
[J]. Computer and Modernization, 2013, 1(8): 175-178,.
|
| [14] |
XU Shuai.
Research on Enforcing Privacy Security in MapReduce Based on Decentralized Information Flow Control
[J]. Computer and Modernization, 2012, 1(03): 93-97.
|
| [15] |
RAO Lan-xiang.
Research on Data Mining Based on Privacy Protection
[J]. Computer and Modernization, 2011, 12(12): 109-111.
|