ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Strategies and modeling of rumors defense and privacy protection on complex networks
Future Communication Technology and Engineering
◽
10.1201/b18331-30
◽
2015
◽
pp. 125-129
Author(s):
Z Sun
◽
M Tang
◽
X Fu
Keyword(s):
Complex Networks
◽
Privacy Protection
Download Full-text
Related Documents
Cited By
References
Proposal Tightens Privacy Protection
Internal Medicine News
◽
10.1016/s1097-8690(10)70711-3
◽
2010
◽
Vol 43
(13)
◽
pp. 77
Author(s):
MARY ELLEN SCHNEIDER
Keyword(s):
Privacy Protection
Download Full-text
Complex Networks
10.1017/cbo9780511780356
◽
2009
◽
Cited By ~ 464
Author(s):
Reuven Cohen
◽
Shlomo Havlin
Keyword(s):
Complex Networks
Download Full-text
A two-sources estimator based on the expectation of permitted permutations count in complex networks
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.2020eal2035
◽
2020
◽
Author(s):
Liang Zhu
◽
Youguo Wang
◽
Jian Liu
Keyword(s):
Complex Networks
Download Full-text
Speech Privacy Protection based on Optimal Controlling Estimated Speech Transmission Index in Noisy Reverberant Environments
2020 28th European Signal Processing Conference (EUSIPCO)
◽
10.23919/eusipco47968.2020.9287627
◽
2021
◽
Author(s):
Suradej Duangpummet
◽
Phrimphissa Kraikhun
◽
Chatrin Phunruangsakao
◽
Jessada Karnjana
◽
Masashi Unoki
◽
...
Keyword(s):
Privacy Protection
◽
Transmission Index
◽
Reverberant Environments
◽
Speech Transmission
Download Full-text
An algorithm for detecting overlapping and multilayer communities in complex networks
Management Innovation and Information Technology
◽
10.2495/miit130341
◽
2014
◽
Author(s):
Cheng Jing
◽
Ling Chen
◽
Sheng-Rong Zou
Keyword(s):
Complex Networks
Download Full-text
Complex Networks from Simple Rules
Complex Systems
◽
10.25088/complexsystems.22.2.151
◽
2013
◽
Vol 22
(2)
◽
pp. 151-174
◽
Cited By ~ 1
Author(s):
Richard Southwell
◽
Jianwei Huang
◽
Chris Cannings
◽
◽
Keyword(s):
Complex Networks
◽
Simple Rules
Download Full-text
Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v6i9.58
◽
2018
◽
Vol 6
(9)
◽
pp. 5-8
Author(s):
Kavita V. Dubey
◽
Vina M. Lomte
Keyword(s):
Intrusion Detection
◽
Healthcare System
◽
Privacy Protection
Download Full-text
Privacy Protection in Personalized Web Search using Obfuscation
International Journal of Emerging Trends in Engineering Research
◽
10.30534/ijeter/2020/76842020
◽
2020
◽
Vol 8
(4)
◽
pp. 1410-1416
Author(s):
Krishan Kumar
Keyword(s):
Privacy Protection
◽
Web Search
Download Full-text
Modeling the interaction of complex networks
10.31274/etd-180810-3491
◽
2014
◽
Author(s):
Wenjia Liu
Keyword(s):
Complex Networks
Download Full-text
Multimedia security. Guideline for privacy protection of equipment and systems in and out of use
10.3403/30152269u
◽
2015
◽
Keyword(s):
Privacy Protection
◽
Multimedia Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close