期刊文献+
共找到17,972篇文章
< 1 2 250 >
每页显示 20 50 100
FedDPL:Federated Dynamic Prototype Learning for Privacy-Preserving Malware Analysis across Heterogeneous Clients
1
作者 Danping Niu Yuan Ping +2 位作者 Chun Guo Xiaojun Wang Bin Hao 《Computers, Materials & Continua》 2026年第3期1989-2014,共26页
With the increasing complexity of malware attack techniques,traditional detection methods face significant challenges,such as privacy preservation,data heterogeneity,and lacking category information.To address these i... With the increasing complexity of malware attack techniques,traditional detection methods face significant challenges,such as privacy preservation,data heterogeneity,and lacking category information.To address these issues,we propose Federated Dynamic Prototype Learning(FedDPL)for malware classification by integrating Federated Learning with a specifically designed K-means.Under the Federated Learning framework,model training occurs locally without data sharing,effectively protecting user data privacy and preventing the leakage of sensitive information.Furthermore,to tackle the challenges of data heterogeneity and the lack of category information,FedDPL introduces a dynamic prototype learning mechanism,which adaptively adjusts the clustering prototypes in terms of position and number.Thus,the dependency on predefined category numbers in typical K-means and its variants can be significantly reduced,resulting in improved clustering performance.Theoretically,it provides a more accurate detection of malicious behavior.Experimental results confirm that FedDPL excels in handling malware classification tasks,demonstrating superior accuracy,robustness,and privacy protection. 展开更多
关键词 Malware classification data heterogeneity federated learning CLUSTERING differential privacy
在线阅读 下载PDF
DPIL-Traj: Differential Privacy Trajectory Generation Framework with Imitation Learning
2
作者 Huaxiong Liao Xiangxuan Zhong +4 位作者 Xueqi Chen Yirui Huang Yuwei Lin Jing Zhang Bruce Gu 《Computers, Materials & Continua》 2026年第1期1530-1550,共21页
The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns.However,the use of real-world trajectory data poses significant privacy risks,such as location re... The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns.However,the use of real-world trajectory data poses significant privacy risks,such as location reidentification and correlation attacks.To address these challenges,privacy-preserving trajectory generation methods are critical for applications relying on sensitive location data.This paper introduces DPIL-Traj,an advanced framework designed to generate synthetic trajectories while achieving a superior balance between data utility and privacy preservation.Firstly,the framework incorporates Differential Privacy Clustering,which anonymizes trajectory data by applying differential privacy techniques that add noise,ensuring the protection of sensitive user information.Secondly,Imitation Learning is used to replicate decision-making behaviors observed in real-world trajectories.By learning from expert trajectories,this component generates synthetic data that closely mimics real-world decision-making processes while optimizing the quality of the generated trajectories.Finally,Markov-based Trajectory Generation is employed to capture and maintain the inherent temporal dynamics of movement patterns.Extensive experiments conducted on the GeoLife trajectory dataset show that DPIL-Traj improves utility performance by an average of 19.85%,and in terms of privacy performance by an average of 12.51%,compared to state-of-the-art approaches.Ablation studies further reveal that DP clustering effectively safeguards privacy,imitation learning enhances utility under noise,and the Markov module strengthens temporal coherence. 展开更多
关键词 privacy-PRESERVING trajectory generation differential privacy imitation learning Markov chain
在线阅读 下载PDF
预变形对DP590双相钢性能的影响
3
作者 张茜 牛星辉 +1 位作者 刘淑影 王嘉伟 《锻压技术》 北大核心 2026年第2期259-265,299,共8页
以DP590双相钢为研究对象,采用单轴拉伸试验对较大尺寸试样施加预变形量为0%、3%、6%、9%、12%和15%的6种预变形,卸载后采用线切割制样并准静态拉伸至失效,获取其力学性能、加工硬化行为和局部成形性能的演变规律。结果表明:随着预变形... 以DP590双相钢为研究对象,采用单轴拉伸试验对较大尺寸试样施加预变形量为0%、3%、6%、9%、12%和15%的6种预变形,卸载后采用线切割制样并准静态拉伸至失效,获取其力学性能、加工硬化行为和局部成形性能的演变规律。结果表明:随着预变形量的增加,DP590钢的强度升高,规定非比例延伸强度变化尤为明显,屈强比逐渐趋近于1,总伸长率轻微升高,且多道次成形更利于全局成形;预变形会改变材料的加工硬化行为,无预变形时DP590钢在小应变范围内加工硬化特性突出,而预变形后在大应变范围内加工硬化更显著,随着预变形量的增加,材料加工硬化能力降低;局部成形性能随着预变形量的增加呈线性降低趋势。针对拉延后翻边/整形零件,可将预变形量控制在6%~9%,以平衡后续型面特征成形和边缘局部抗裂需求。 展开更多
关键词 预变形 dp590双相钢 力学性能 加工硬化性能 局部成形性能
原文传递
亚麻E2F/DP转录因子基因家族鉴定及表达分析
4
作者 刘萍萍 孙阎 +11 位作者 刘丹丹 唐立郦 杨洌 程莉莉 康庆华 宋喜霞 姜忠娟 刘烨 孙茹 吴广文 杨学 袁红梅 《江苏农业学报》 北大核心 2026年第2期250-263,共14页
为明确亚麻E2F/DP家族基因的生物信息学特征及其在作物生长发育过程中的影响机制,本研究通过生物信息学方法,分析亚麻E2F/DP家族基因结构、顺式作用元件、染色体定位、物种内和物种间共线性特征,及其编码蛋白质的理化性质和互作网络,并... 为明确亚麻E2F/DP家族基因的生物信息学特征及其在作物生长发育过程中的影响机制,本研究通过生物信息学方法,分析亚麻E2F/DP家族基因结构、顺式作用元件、染色体定位、物种内和物种间共线性特征,及其编码蛋白质的理化性质和互作网络,并利用转录组测序(RNA-seq)技术分析不同激素处理下亚麻E2F/DP基因的表达模式。结果表明,亚麻基因组中共鉴定到14个E2F/DP家族基因,其中有7个属于E2F亚家族,3个属于DP亚家族,4个属于DEL亚家族;同一亚家族的E2F/DP基因结构及其编码蛋白质的保守基序分布、保守结构域高度相似。物种内共发现16对共线性基因,且存在共线性的两个基因位于不同的染色体上。亚麻E2F/DP家族基因启动子序列中含有丰富的光响应元件、激素响应元件、胁迫响应元件、发育过程特定元件等。3个DP亚家族蛋白质(Lus10014423、Lus10022620和Lus10023926)为关键枢纽蛋白。不同激素处理后,亚麻茎部中段、茎部下段与叶片中14个E2F/DP家族基因均呈现差异性表达,基于实时荧光定量PCR(qRT-PCR)得到的Lus10022620和Lus10039455基因相对表达量与转录组测序结果在变化趋势上基本一致。本研究结果为进一步开展激素对亚麻E2F/DP转录因子的调控机制研究提供了基础。 展开更多
关键词 亚麻 E2F/dp家族基因 转录因子
在线阅读 下载PDF
基于LDP的迭代自适应划分键值数据收集方法
5
作者 孙庆毅 李晓会 +2 位作者 兰洁 贾旭 李波 《计算机工程与设计》 北大核心 2026年第1期154-164,共11页
针对现有键值数据收集机制在数据精度估计方面的局限性,提出了一种基于本地差分隐私的迭代自适应划分键值数据收集方法。通过两阶段设计实现精准估计,第一阶段在本地对所有键值对值域进行初步划分并完成编码、扰动,由服务器聚合估计;第... 针对现有键值数据收集机制在数据精度估计方面的局限性,提出了一种基于本地差分隐私的迭代自适应划分键值数据收集方法。通过两阶段设计实现精准估计,第一阶段在本地对所有键值对值域进行初步划分并完成编码、扰动,由服务器聚合估计;第二阶段基于第一阶段估计结果自适应优化值域划分区间,迭代执行第一阶段步骤,利用误差阈值控制迭代次数,以实现准确的估计结果。理论分析了算法满足本地差分隐私和无偏估计。实验结果表明了算法的有效性和实用性。 展开更多
关键词 本地差分隐私 键值数据 自适应划分 频率估计 均值估计 数据收集 隐私保护
在线阅读 下载PDF
AA1060/DP690T磁脉冲焊接接头成形工艺、组织及力学性能研究
6
作者 于朋 张体明 +4 位作者 陈玉华 叶智康 谢吉林 王善林 张世一 《精密成形工程》 北大核心 2026年第2期123-133,共11页
目的 探究工艺参数对AA1060/DP690T异种金属磁脉冲焊接接头界面微观组织和力学性能的影响规律,并揭示基板镀镍处理对接头性能的作用机制。方法 利用磁脉冲焊接设备制备焊接接头,通过显微组织观察、能谱分析、电子背散射技术和剪切强度... 目的 探究工艺参数对AA1060/DP690T异种金属磁脉冲焊接接头界面微观组织和力学性能的影响规律,并揭示基板镀镍处理对接头性能的作用机制。方法 利用磁脉冲焊接设备制备焊接接头,通过显微组织观察、能谱分析、电子背散射技术和剪切强度测试等手段,系统研究了工艺参数对接头界面微观组织和力学性能的影响,除此之外,还研究了镀镍层对接头性能的影响。结果 当放电能量为30 kJ、初始间隙为1.5 mm时,接头剪切强度最高,达到AA1060强度的82.5%。界面金属间化合物(IMC)平均晶粒尺寸(约0.8µm)显著小于AA1060(约15µm)和DP690T(约5µm),铝母材压深(1 000 nm)<IMC层压深(570 nm)<钢母材压深(420 nm),界面呈现典型硬度过渡特征。随着放电能量的增高,IMC厚度由3µm增大到20µm,界面失效模式也由韧性断裂转变为脆性断裂。当放电能量为30 kJ、初始间隙为1.5 mm时,相较于AA1060/DP690T接头,AA1060/镀镍DP690T接头的最大剪切载荷由4.65 kN减小到3.59 kN,降低了22.7%,延伸长度由3.02 mm增大到4.78 mm,增加了57.9%。结论 IMC的中间硬度特性(介于两母材之间)实现了力学性能梯度过渡,从而缓解了铝/钢热膨胀系数差异引发的残余应力,增强了接头的连接性能;镀镍层使接头从强度主导型转变为韧性主导型,更适用于抗冲击的工程应用。 展开更多
关键词 磁脉冲焊接 AA1060/dp690T异种材料 放电能量 初始间隙 微观组织 力学性能
在线阅读 下载PDF
SDP-FL:选择性差分隐私的工业物联网联邦学习框架
7
作者 刘暄 刘亚 +2 位作者 王新中 赵逢禹 刘先蓓 《计算机应用研究》 北大核心 2026年第3期720-728,共9页
随着工业物联网(IIoT)的快速发展,如何在保护数据隐私的前提下高效利用设备数据成为亟待解决的问题。联邦学习(FL)作为一种通过本地训练模型并共享模型参数的技术,已成为保障数据隐私的有效方法。然而,现有FL仍存在隐私泄露的风险。为此... 随着工业物联网(IIoT)的快速发展,如何在保护数据隐私的前提下高效利用设备数据成为亟待解决的问题。联邦学习(FL)作为一种通过本地训练模型并共享模型参数的技术,已成为保障数据隐私的有效方法。然而,现有FL仍存在隐私泄露的风险。为此,提出了一种面向工业物联网的选择性差分隐私联邦学习(SDP-FL)框架。该框架通过将智能工厂的终端设备作为客户端参与联邦学习,在客户端侧通过最小裁剪和高斯噪声保护局部模型隐私;在服务器端,采用基于损失函数差值的筛选机制来设定模型参数更新阈值,仅聚合高质量的本地模型。实验结果表明,SDP-FL框架在MNIST和CIFAR-10数据集上的分类准确率分别为97.8%和79.2%,较传统联邦学习方法分别提高了1.6和0.6个百分点。该方法有效避免了无用梯度的干扰,同时也提升了模型聚合效用。 展开更多
关键词 联邦学习 工业物联网 高斯差分隐私 最小裁剪
在线阅读 下载PDF
FedPPB:基于PSO和Paillier加密算法的区块链联邦学习方法
8
作者 沈凡凡 刘梓昂 +3 位作者 梁琦玮 徐超 陈勇 何炎祥 《计算机研究与发展》 北大核心 2026年第3期685-709,共25页
在人工智能快速发展的背景下,数据隐私与系统效率成为分布式智能系统中的核心挑战。现有研究虽在一定程度上缓解了数据泄露问题,但在资源分配、系统开销和安全性方面仍存在显著瓶颈。为此,构建了一种基于粒子群优化(particle swarm opti... 在人工智能快速发展的背景下,数据隐私与系统效率成为分布式智能系统中的核心挑战。现有研究虽在一定程度上缓解了数据泄露问题,但在资源分配、系统开销和安全性方面仍存在显著瓶颈。为此,构建了一种基于粒子群优化(particle swarm optimization,PSO)和Paillier加密算法的区块链联邦学习方法,简称FedPPB,该方法融合PSO算法与Paillier同态加密算法,实现对系统角色的动态优化分配与训练参数的加密保护。首先,针对工作节点、验证节点和矿工节点的任务特点,通过PSO算法构建包含模型准确率、验证时间和区块生成时间的适应度函数,实现角色数量的动态调整;其次,工作节点通过Paillier算法对参数更新进行加密,验证节点解密参数并验证其合法性,矿工节点生成区块并更新全局模型;最后,从理论上证明了PSO算法和Paillier算法分别在角色分配和参数加密中的安全性。实验表明,在MNIST,Fashion-MNIST,CIFAR-10数据集上,当恶意节点的占比为15%和25%时,FedPPB显著优于现有方法,展现出更高的准确率与鲁棒性。 展开更多
关键词 联邦学习 区块链 隐私保护 Paillier 粒子群优化
在线阅读 下载PDF
3DP技术在砂芯铸造中的应用与材料特性研究进展
9
作者 郑函 朱鑫汗 +1 位作者 刘凤国 娄长胜 《中国铸造装备与技术》 2026年第2期57-64,共8页
3DP打印砂芯技术能突破传统铸造工艺的限制,实现复杂结构铸件的快速精确成形,符合铸造行业绿色化和智能化的发展趋势。本文首先对比3DP与SLS技术在砂芯打印中的工艺特点,指出3DP技术具有成本低、效率高、砂芯透气性好等优势。综述了该... 3DP打印砂芯技术能突破传统铸造工艺的限制,实现复杂结构铸件的快速精确成形,符合铸造行业绿色化和智能化的发展趋势。本文首先对比3DP与SLS技术在砂芯打印中的工艺特点,指出3DP技术具有成本低、效率高、砂芯透气性好等优势。综述了该技术在铸钢、铸铝及其他轻合金铸件中的应用进展:在铝合金铸件中可提高生产效率并解决复杂结构制造难题;在铸钢件中能满足性能要求并持续优化;在钛合金等轻合金铸造中可通过工艺调控改善制品性能。砂芯3DP打印的原材料包括型砂和粘结剂。砂型种类包括硅砂、石英砂、锆英砂等,各具特点,粘结剂则涵盖呋喃树脂、酚醛树脂及环保型粘结剂等,其性能直接影响砂芯质量。环保型粘结剂研发以及旧砂回收技术通过振动筛分离、焙烧再生等工艺,显著降低资源浪费与环境污染。 展开更多
关键词 3dp技术 砂芯铸造 材料特性 应用进展
在线阅读 下载PDF
X80M管线钢DP-TIG焊接接头的显微组织和力学性能
10
作者 李勇齐 薛瑞雷 +2 位作者 吴伟 夏磊 刘宏胜 《热加工工艺》 北大核心 2026年第1期118-124,共7页
为优化X80M管线钢在深熔氩弧焊接方法(deep penetration tungsten inert gas welding,DP-TIG)工艺下的焊接参数,采用平板对接(母材自熔)方式对DP-TIG焊接工艺过程中的焊接电流与焊接速度参数进行正交试验,分析DP-TIG焊接工艺对管线钢接... 为优化X80M管线钢在深熔氩弧焊接方法(deep penetration tungsten inert gas welding,DP-TIG)工艺下的焊接参数,采用平板对接(母材自熔)方式对DP-TIG焊接工艺过程中的焊接电流与焊接速度参数进行正交试验,分析DP-TIG焊接工艺对管线钢接头正反面成型效果、显微组织、力学性能的影响,从而获得最优的焊接工艺参数。结果表明:在DP-TIG焊接工艺下,获得无缺陷、成型良好的焊接接头。由于热输入较高,且冷却梯度较大,所以焊缝熔合线清晰可见,接头组织主要由铁素体和贝氏体组成,焊缝区、粗晶区和细晶区的平均晶粒尺寸分别为7.6、13.6和8.1μm。该接头的抗拉强度、屈服强度分别为697、627 MPa,拉伸试件断口位于母材位置。焊缝与热影响区冲击吸收能量为184 J和203 J。 展开更多
关键词 X80M管线钢 dp-TIG焊接 微观组织 力学性能
原文传递
DP-Fed6G:An adaptive differential privacy-empowered federated learning framework for 6G networks
11
作者 Miao Du Peng Yang +2 位作者 Yinqiu Liu Xiaoming He Mingkai Chen 《Digital Communications and Networks》 2025年第6期1994-2002,共9页
The advent of 6G networks is poised to drive a new era of intelligent,privacy-preserving distributed learning by leveraging advanced communication and AI-driven edge intelligence.Federated Learning(FL)has emerged as a... The advent of 6G networks is poised to drive a new era of intelligent,privacy-preserving distributed learning by leveraging advanced communication and AI-driven edge intelligence.Federated Learning(FL)has emerged as a promising paradigm to enable collaborative model training without exposing raw data.However,its deployment in 6G networks faces significant obstacles,including vulnerabilities to inference attacks,the complexities of heterogeneous and dynamic network environments,and the inherent trade-off between privacy protection and model performance.In response to these challenges,we introduce DP-Fed6G,a novel FL framework that integrates differential privacy(DP)to fortify data security while ensuring high-quality learning outcomes.Specifically,DPFed6G employs an adaptive noise injection strategy that dynamically adjusts privacy protection levels based on real-time 6G network conditions and device heterogeneity,ensuring robust data security while maximizing model performance and optimizing the trade-off between privacy and utility.Extensive experiments on three real-world healthcare datasets demonstrate that DP-Fed6G consistently outperforms existing baselines(DP-Fed SGD and DPFed Avg),achieving up to 10.3%higher test accuracy under the same privacy budget.The proposed framework thus provides a practical solution for secure and privacy-preserving AI in 6G,supporting intelligent decisionmaking in privacy-sensitive applications. 展开更多
关键词 Differential privacy Federated learning 6G Gaussian noise
在线阅读 下载PDF
AI核磁帮:基于DP5的核磁谱图智能解析
12
作者 杨智科 许锦帆 +3 位作者 陈俊豪 杨政 丁飞 苏乃强 《大学化学》 2026年第1期20-28,共9页
当前核磁共振波谱的仪器分析实验常常忽视核磁谱图解析的教学和训练。本文自主开发了基于DP5软件包的核磁谱图智能解析系统“AI核磁帮”,应用于本科生核磁解谱训练的结果判断,并开创性提出“AI+核磁仪器分析实验”的教学模式。AI核磁帮... 当前核磁共振波谱的仪器分析实验常常忽视核磁谱图解析的教学和训练。本文自主开发了基于DP5软件包的核磁谱图智能解析系统“AI核磁帮”,应用于本科生核磁解谱训练的结果判断,并开创性提出“AI+核磁仪器分析实验”的教学模式。AI核磁帮集核磁谱图识别标峰、用户解谱练习、AI验证结果和结果可视化反馈四大功能于一体,建成本科生解谱训练的一站式平台。学生通过仪器分析实验或文献获得核磁谱图后,在系统上进行解谱并给出化合物结构,DP5经分析计算后,反馈结构上各个碳原子的误差大小。学生通过不断试错和调整思路,解出正确结构,以此深入理解核磁谱图知识。开创的“谱库选谱-解谱实践-个性方案”教学模式,在锻炼学生解谱能力的同时,使用AI提高教学评价的效率,进一步开发后可应用于其他仪器分析实验。 展开更多
关键词 核磁共振 仪器分析实验 dp5 人工智能
在线阅读 下载PDF
DP1180双相钢在高应变速率下的力学性能及断裂行为
13
作者 董伊康 薛仁杰 +4 位作者 刘乐天 王学慧 赵楠 路洪洲 王立辉 《机械工程材料》 北大核心 2026年第1期58-64,共7页
对DP1180双相钢进行准静态(应变速率0.001,0.01s^(-1))和动态(应变速率0.1,1,10,50,100,200,500,1000 s^(-1))拉伸试验,研究了其力学特征、断裂行为以及微观结构演变规律。结果表明:随着应变速率增加,DP1180双相钢的抗拉强度、屈服强度... 对DP1180双相钢进行准静态(应变速率0.001,0.01s^(-1))和动态(应变速率0.1,1,10,50,100,200,500,1000 s^(-1))拉伸试验,研究了其力学特征、断裂行为以及微观结构演变规律。结果表明:随着应变速率增加,DP1180双相钢的抗拉强度、屈服强度、断后伸长率和均匀伸长率均增大,高应变速率(100~1000 s^(-1))下屈服强度的应变速率敏感性相比抗拉强度更大。随着应变速率增加,拉伸试样表面微观形貌由断层状变为撕裂状,横向微裂纹数量增多,但当应变速率达到1000 s^(-1)时横向裂纹几乎消失,出现大量微孔洞型断裂形态。不同应变速率下DP1180双相钢均发生微孔聚集型韧性断裂,随着应变速率增加,断口处大尺寸韧窝数量增多,韧窝中心出现由马氏体破碎形成的较深孔洞。高应变速率拉伸后钢中的马氏体板条较细,位错密度较大。位错强化和马氏体变形是高应变速率下强度增大的主要原因;绝热温升激活马氏体的塑性变形能力则是塑性增大的主要原因。 展开更多
关键词 dp1180双相钢 应变速率 力学性能 断裂行为
在线阅读 下载PDF
Personalized Differential Privacy Graph Neural Network
14
作者 Yanli Yuan Dian Lei +3 位作者 Chuan Zhang Zehui Xiong Chunhai Li Liehuang Zhu 《IEEE/CAA Journal of Automatica Sinica》 2026年第2期498-500,共3页
Dear Editor,This letter addresses the critical challenge of preserving privacy in graph learning without compromising on data utility.Differential privacy(DP)is emerging as an effective method for privacy-preserving g... Dear Editor,This letter addresses the critical challenge of preserving privacy in graph learning without compromising on data utility.Differential privacy(DP)is emerging as an effective method for privacy-preserving graph learning.However,its application often diminishes data utility,especially for nodes with fewer neighbors in graph neural networks(GNNs). 展开更多
关键词 graph neural networks gnns personalized differential privacy graph learning privacy preservation data utility preserving privacy graph neural network
在线阅读 下载PDF
Privacy-Preserving Personnel Detection in Substations via Federated Learning with Dynamic Noise Adaptation
15
作者 Yuewei Tian Yang Su +4 位作者 Yujia Wang Lisa Guo Xuyang Wu Lei Cao Fang Ren 《Computers, Materials & Continua》 2026年第3期894-915,共22页
This study addresses the risk of privacy leakage during the transmission and sharing of multimodal data in smart grid substations by proposing a three-tier privacy-preserving architecture based on asynchronous federat... This study addresses the risk of privacy leakage during the transmission and sharing of multimodal data in smart grid substations by proposing a three-tier privacy-preserving architecture based on asynchronous federated learning.The framework integrates blockchain technology,the InterPlanetary File System(IPFS)for distributed storage,and a dynamic differential privacy mechanism to achieve collaborative security across the storage,service,and federated coordination layers.It accommodates both multimodal data classification and object detection tasks,enabling the identification and localization of key targets and abnormal behaviors in substation scenarios while ensuring privacy protection.This effectively mitigates the single-point failures and model leakage issues inherent in centralized architectures.A dynamically adjustable differential privacy mechanism is introduced to allocate privacy budgets according to client contribution levels and upload frequencies,achieving a personalized balance between model performance and privacy protection.Multi-dimensional experimental evaluations,including classification accuracy,F1-score,encryption latency,and aggregation latency,verify the security and efficiency of the proposed architecture.The improved CNN model achieves 72.34%accuracy and an F1-score of 0.72 in object detection and classification tasks on infrared surveillance imagery,effectively identifying typical risk events such as not wearing safety helmets and unauthorized intrusion,while maintaining an aggregation latency of only 1.58 s and a query latency of 80.79 ms.Compared with traditional static differential privacy and centralized approaches,the proposed method demonstrates significant advantages in accuracy,latency,and security,providing a new technical paradigm for efficient,secure data sharing,object detection,and privacy preservation in smart grid substations. 展开更多
关键词 SUBSTATION privacy preservation asynchronous federated learning CNN differential privacy
在线阅读 下载PDF
A Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering
16
作者 Fang Liu Xianghui Meng +1 位作者 Jiachen Li Sibo Guo 《Computers, Materials & Continua》 2026年第2期632-652,共21页
With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods... With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods are deficient,failing to reasonably allocate the privacy budget for non-outlier location points and ignoring the critical location information that may be contained in the outlier points,leading to decreased data availability and privacy exposure problems.To address these problems,this paper proposes a Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering(MLDP).The method first utilizes the DBSCAN clustering algorithm to classify location points into non-outliers and outliers.For non-outliers,the scoring function is designed by combining geographic information and semantic information,and the privacy budget is allocated according to the heat intensity of the hotspot area;for outliers,the scoring function is constructed to allocate the privacy budget based on their correlation with the hotspot area.By comprehensively considering the geographic information,semantic information,and correlation with hotspot areas of the location points,a reasonable privacy budget is assigned to each location point,andfinallynoise is added throughthe Laplacemechanismto realizeprivacyprotection.Experimental results on tworeal trajectory datasets,Geolife and T-Drive,show that the MLDP approach significantly improves data availability while effectively protecting location privacy.Compared with the comparison methods,the maximum available data ratio of MLDP is 1.Moreover,compared with the RandomNoise method,its execution time is 0.056–0.061 s longer,and the logRE is 0.12951–0.62194 lower;compared with KemeansDP,QTK-DP,DPK-F,IDP-SC,and DPK-Means-up methods,it saves 0.114–0.296 s in execution time,and the logRE is 0.01112–0.38283 lower. 展开更多
关键词 Location privacy protection DBSCAN clustering differential privacy hotspot area
在线阅读 下载PDF
A Review on Penetration Testing for Privacy of Deep Learning Models
17
作者 Salma Akther Wencheng Yang +5 位作者 Song Wang Shicheng Wei Ji Zhang Xu Yang Yanrong Lu Yan Li 《Computers, Materials & Continua》 2026年第5期43-76,共34页
As deep learning(DL)models are increasingly deployed in sensitive domains(e.g.,healthcare),concerns over privacy and security have intensified.Conventional penetration testing frameworks,such asOWASP and NIST,are effe... As deep learning(DL)models are increasingly deployed in sensitive domains(e.g.,healthcare),concerns over privacy and security have intensified.Conventional penetration testing frameworks,such asOWASP and NIST,are effective for traditional networks and applications but lack the capabilities to address DL-specific threats,such asmodel inversion,membership inference,and adversarial attacks.This review provides a comprehensive analysis of penetration testing for the privacy of DL models,examining the shortfalls of existing frameworks,tools,and testing methodologies.Through systematic evaluation of existing literature and empirical analysis,we identify three major contributions:(i)a critical assessment of traditional penetration testing frameworks’inadequacies when applied to DL-specific privacy vulnerabilities,(ii)a comprehensive evaluation of state-of-the-art privacy-preserving methods and their integration with penetration testing workflows,and(iii)the development of a structured framework that combines reconnaissance,threat modeling,exploitation,and post-exploitation phases specifically tailored for DL privacy assessment.Moreover,this review evaluates popular solutions such as IBMAdversarial Robustness Toolbox and TensorFlowPrivacy,alongside privacy-preserving techniques(e.g.,Differential Privacy,Homomorphic Encryption,and Federated Learning),which we systematically analyze through comparative studies of their effectiveness,computational overhead,and practical deployment constraints.While these techniques offer promising safeguards,their adoption is hindered by accuracy loss,performance overheads,and the rapid evolution of attack strategies.Our findings reveal that no single existing solution provides comprehensive protection,which leads us to propose a hybrid approach that strategically combines multiple privacy-preserving mechanisms.The findings of this survey underscore an urgent need for automated,regulationcompliant penetration testing frameworks specifically tailored to DL systems.We argue for hybrid privacy solutions that combinemultiple protectivemechanisms to ensure bothmodel accuracy and privacy.Building on our analysis,we present actionable recommendations for developing adaptive penetration testing strategies that incorporate automated vulnerability assessment,continuous monitoring,and regulatory compliance verification. 展开更多
关键词 Penetration testing deep learning homomorphic encryption differential privacy federated learning
在线阅读 下载PDF
Personalized Differential Privacy for Support Vector Machines
18
作者 WANG Xiaofeng LIU Xingwei XU Wangli 《Journal of Systems Science & Complexity》 2026年第1期180-202,共23页
The support vector machine,a widely used binary classification method,may expose sensitive information during training.To address this,the authors propose a personalized differential privacy method that extends differ... The support vector machine,a widely used binary classification method,may expose sensitive information during training.To address this,the authors propose a personalized differential privacy method that extends differential privacy.Specifically,the authors introduce personalized differentially private support vector machines to meet different individuals'privacy requirements,using a reweighting strategy and the Laplace mechanism.Theoretical analysis demonstrates that the proposed methods simultaneously satisfy the requirements of personalized differential privacy and ensure model prediction accuracy at these privacy levels.Extensive experiments demonstrate that the proposed methods outperform the existing methods. 展开更多
关键词 Laplace mechanism personalized differential privacy reweighting strategy support vector machine
原文传递
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
19
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks privacy scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
Security and Privacy Challenges,Solutions,and Performance Evaluation in AIoT-Enabled Smart Societies
20
作者 Shahab Ali Khan Tehseen Mazhar +5 位作者 Syed Faisal Abbas Shah Wasim Ahmad Sunawar Khan Afsha BiBi Usama Shah Habib Hamam 《Computer Modeling in Engineering & Sciences》 2026年第3期179-217,共39页
The convergence of Artificial Intelligence(AI)and the Internet of Things(IoT)has enabled Artificial Intelligence of Things(AIoT)systems that support intelligent and responsive smart societies,but it also introduces ma... The convergence of Artificial Intelligence(AI)and the Internet of Things(IoT)has enabled Artificial Intelligence of Things(AIoT)systems that support intelligent and responsive smart societies,but it also introduces major security and privacy concerns across domains such as healthcare,transportation,and smart cities.This Systemic Literature Review(SLR)addresses three research questions:identifying major threats and challenges in AIoT ecosystems,reviewing state-of-the-art security and privacy techniques,and evaluating their effectiveness.An SLR covering the period from 2020 to 2025 was conducted using major academic digital libraries,including IEEE Xplore,ACM Digital Library,ScienceDirect,SpringerLink,and Wiley Online Library,with a focus on security-and privacy-enhancing techniques such as blockchain,federated learning,and edge AI.The SLR identifies key challenges including data privacy leakage,authentication,cloud dependency,and attack surface expansion,and finds that emerging techniques,while promising,often involve trade-offs related to latency,scalability,and compliance.The study highlights future directions including lightweight cryptography,standardization,and explainable AI to support secure and trustworthy AIoT-enabled smart societies. 展开更多
关键词 Artificial Intelligence of Things(AIoT) smart societies security privacy blockchain federated learning edge computing
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部