The sampling problem under local differential privacy has recently been studied with potential applications to generative models, but a fundamental analysis of its privacy-utility trade-off (PUT) remains incomplete. I...
详细信息
With the wide adoption of Web APIs released on Internet, users tend to reuse them for business requirements or software development. Mashup is a useful technology for composing Web APIs into a new and value-added appl...
详细信息
Video content in Live HTTP Adaptive Streaming (HAS) is typically encoded using a pre-defined, fixed set of bitrate-resolution pairs (termed Bitrate Ladder), allowing play-back devices to adapt to changing network cond...
详细信息
With the development of 5 g, computing-intensive and complex applications in smart-city is growing rapidly. Due to the limited resources of mobile terminal devices in smart-city, new applications have higher requ...
详细信息
Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for researchers in v...
详细信息
Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for researchers in various fields. In this paper, we adopt tools used to analyze complex networks to evaluate user reputation and item quality. In our proposed Accumulative Time Based Ranking (ATR) algorithm, we take into account the growth record of the network to identify the evolution of the reputation of users and the quality of items, by incorporating two behavior weighting factors which can capture the hidden facts on reputation and quality dynamics for each user and item respectively. Our proposed ATR algorithm mainly combines the iterative approach to rank user reputation and item quality with temporal dependence compared with other reputation evaluation methods. We show that our algorithm outperforms other benchmark ranking algorithms in terms of precision and robustness on empirical datasets from various online retailers and the citation datasets among research publications. Therefore, our proposed method has the capability to effectively evaluate user reputation and item quality.
As most of our daily activities and routines are connected to technology and software, cybersecurity and malware research become significantly more important in ensuring that our personal information is kept private a...
详细信息
As most of our daily activities and routines are connected to technology and software, cybersecurity and malware research become significantly more important in ensuring that our personal information is kept private and secure. A significant increase of our interactive environments becoming digitalized has caused cybersecurity teams to play a constant catch up game to ensure the latest updates and platforms are secured against exploitation attempts from malicious entities. With modern technological advancements and discoveries being made, malware evolves, and attackers constantly find new ways to break into a system and exploit the vulnerabilities and shortcomings that are not addressed during the development process. In this paper we analyze four of the most recent malwares and discuss solutions to detect and prevent them from affecting our daily lives.
As technology continues to develop, there is a growing need to find sustainable solutions in all industries, including cryptocurrency. Due to the high energy consumption that cryptocurrencies are known for, there have...
As technology continues to develop, there is a growing need to find sustainable solutions in all industries, including cryptocurrency. Due to the high energy consumption that cryptocurrencies are known for, there have been efforts to reduce waste consumption and in turn minimize the carbon footprint. We support the trends for creating an environment-friendly crypto token using the ERC-20 standard on the Ethereum blockchain. We outline the various aspects that make a token more sustainable and highlight the potential benefits of such tokens. Our proposal involves the design of a smart contract that incorporates eco-friendly features such as lower energy consumption, carbon offsetting, and more efficient methods or algorithms. We also discuss the importance of transparency and accountability in the design and implementation of such tokens. This paper discusses not only the practical tools and steps necessary in creating a crypto token but also highlights the challenges associated with creating a more sustainable token.
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *...
详细信息
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *** quantified the sensitive level of information according to the user’s personalized sensitive information protection *** on the probability distribution of sensitive level and attacker’s knowledge background type,the strategy combination of service provider and attacker was analyzed,and a game-based sensitive information protection model was *** the combination of strategies under Bayesian equilibrium,the information entropy was used to measure the leakage of sensitive ***,in the paper the influence of the sensitive level of information and the attacker’s knowledge background on the strategy of both sides of the game was considered *** on,the leakage of the user’s sensitive information was ***,the feasibility of the model was described by experiments.
This paper proposes a new method based Binary Large Object (BLO) to more effectively manage and load a massive number of three-dimensional (3D) models in the Geographic Information System (GIS). Different from those m...
详细信息
Computer-aided diagnosis plays an increasingly important role in modern medical activities, relying largely on the deployment of medical machine learning models. Protecting the security of model parameters is crucial ...
详细信息
暂无评论