Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Research on Fine-Grained Recognition Method for Sensitive Information in Social Networks Based on CLIP

    Menghan Zhang1,2, Fangfang Shan1,2,*, Mengyao Liu1,2, Zhenyu Wang1,2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1565-1580, 2024, DOI:10.32604/cmc.2024.056008 - 15 October 2024

    Abstract With the emergence and development of social networks, people can stay in touch with friends, family, and colleagues more quickly and conveniently, regardless of their location. This ubiquitous digital internet environment has also led to large-scale disclosure of personal privacy. Due to the complexity and subtlety of sensitive information, traditional sensitive information identification technologies cannot thoroughly address the characteristics of each piece of data, thus weakening the deep connections between text and images. In this context, this paper adopts the CLIP model as a modality discriminator. By using comparative learning between sensitive image descriptions and… More >

  • Open Access

    ARTICLE

    Sensitive Information Protection Model Based on Bayesian Game

    Yuzhen Liu1,2, Zhe Liu3, Xiaoliang Wang1,2,*, Qing Yang4, Guocai Zuo5, Frank Jiang6

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 883-898, 2022, DOI:10.32604/cmc.2022.029002 - 18 May 2022

    Abstract

    A game measurement model considering the attacker's knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service. We quantified the sensitive level of information according to the user's personalized sensitive information protection needs. Based on the probability distribution of sensitive level and attacker's knowledge background type, the strategy combination of service provider and attacker was analyzed, and a game-based sensitive information protection model was constructed. Through the combination of strategies under Bayesian equilibrium, the information entropy was used to

    More >

Displaying 1-10 on page 1 of 2. Per Page