Table of contents
Output regeneration defense against membership inference attacks for protecting data privacy
Yong Ding, Peixiong Huang, Hai Liang, Fang Yuan, Huiyong WangRecently, deep learning (DL) has been widely applied in various aspects of human endeavors. However, studies have shown that DL models may also be a primary cause of data leakage…
586
Incorporating user behavior flow for user risk assessment
Yuxiang Shan, Qin Ren, Gang Yu, Tiantian Li, Bin CaoInternet marketing underground industry users refer to people who use technology means to simulate a large number of real consumer behaviors to obtain marketing activities rewards…
48
STCGCN: a spatio-temporal complete graph convolutional network for remaining useful life prediction of power transformer
Mengda Xing, Weilong Ding, Tianpu Zhang, Han LiRemaining useful life (RUL) prediction for power transformer maintenance is a challenging task on heterogeneous data. Monitoring data of power transformers are not always…
168
ISSN:
1744-0084Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditors:
- Prof. Honghao Gao
- Prof. Li Kuang