Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    REVIEW

    Ensuring User Privacy and Model Security via Machine Unlearning: A Review

    Yonghao Tang1, Zhiping Cai1,*, Qiang Liu1, Tongqing Zhou1, Qiang Ni2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2645-2656, 2023, DOI:10.32604/cmc.2023.032307 - 29 November 2023

    Abstract As an emerging discipline, machine learning has been widely used in artificial intelligence, education, meteorology and other fields. In the training of machine learning models, trainers need to use a large amount of practical data, which inevitably involves user privacy. Besides, by polluting the training data, a malicious adversary can poison the model, thus compromising model security. The data provider hopes that the model trainer can prove to them the confidentiality of the model. Trainer will be required to withdraw data when the trust collapses. In the meantime, trainers hope to forget the injected data More >

  • Open Access

    ARTICLE

    FedNRM: A Federal Personalized News Recommendation Model Achieving User Privacy Protection

    Shoujian Yu1, Zhenchi Jie1, Guowen Wu1, Hong Zhang1, Shigen Shen2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1729-1751, 2023, DOI:10.32604/iasc.2023.039911 - 21 June 2023

    Abstract In recent years, the type and quantity of news are growing rapidly, and it is not easy for users to find the news they are interested in the massive amount of news. A news recommendation system can score and predict the candidate news, and finally recommend the news with high scores to users. However, existing user models usually only consider users’ long-term interests and ignore users’ recent interests, which affects users’ usage experience. Therefore, this paper introduces gated recurrent unit (GRU) sequence network to capture users’ short-term interests and combines users’ short-term interests and long-term… More >

  • Open Access

    ARTICLE

    Enhancing Security by Using GIFT and ECC Encryption Method in Multi-Tenant Datacenters

    Jin Wang1, Ying Liu1, Shuying Rao1, R. Simon Sherratt2, Jinbin Hu1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3849-3865, 2023, DOI:10.32604/cmc.2023.037150 - 31 March 2023

    Abstract Data security and user privacy have become crucial elements in multi-tenant data centers. Various traffic types in the multi-tenant data center in the cloud environment have their characteristics and requirements. In the data center network (DCN), short and long flows are sensitive to low latency and high throughput, respectively. The traditional security processing approaches, however, neglect these characteristics and requirements. This paper proposes a fine-grained security enhancement mechanism (SEM) to solve the problem of heterogeneous traffic and reduce the traffic completion time (FCT) of short flows while ensuring the security of multi-tenant traffic transmission. Specifically, More >

Displaying 1-10 on page 1 of 3. Per Page