This book presents the data privacy protection which has been extensively applied in our current ...
This book constitutes the refereed proceedings of the First International Conference on Security ...
Thisbook covers three major parts of Big Data: concepts, theories andapplications. Written by wor...
This book presents the data privacy protection which has been extensively applied in our current ...
This proceedings, ICMTEL 2022, constitutes the refereed proceedings of the 4 sup thsupInternation...
In the process of transforming modern manufacturing into intelligent manufacturing, more and more...
This book provides detailed practical guidelines on how to develop an efficient pathological brai...
This book provides detailed practical guidelines on how to develop an efficient pathological brai...
This book aims to sort out the clear logic of the development of machine learning-driven privacy ...
This two-volume book constitutes the refereed proceedings of the Second International Conference ...
In the process of transforming modern manufacturing into intelligent manufacturing, more and more...
This brief presents emerging and promising communication methods for network reliability via dela...
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons...
This book constitutes the refereed post-conference proceedings of the 17 sup thsupEAI Internation...
In this book, the authors highlight the latest research findings on the security and privacy of f...
Thisbook covers three major parts of Big Data: concepts, theories andapplications. Written by wor...
This two-volume book constitutes the refereed proceedings of the Second International Conference ...
In this book, the authors highlight the latest research findings on the security and privacy of f...
This book timely provides high-quality records of 32 PTB sections across different depositional s...
An Introduction to the Machine Learning Empowered Intelligent Data Center Networking Fundamentals...
This book timely provides high-quality records of 32 PTB sections across different depositional s...
This brief provides readers a complete and self-contained resource for information about DDoS att...
As 'right to be forgotten' style regulations, data governance requirements, and security concerns...