共 320 条
- [1] Acs Gergely, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P118, DOI 10.1007/978-3-642-24178-9_9
- [2] Differentially Private Histogram Publishing through Lossy Compression [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012), 2012, : 1 - 10
- [3] Machine learning and data analytics for the IoT [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (20) : 16205 - 16233
- [4] Agrawal D., 2003, IEEE Security & Privacy, V1, P27, DOI 10.1109/MSECP.2003.1253565
- [5] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
- [7] Al-Qaseemi SA, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P731, DOI 10.1109/FTC.2016.7821686
- [8] Overview of non-intrusive load monitoring and identification techniques [J]. IFAC PAPERSONLINE, 2015, 48 (30): : 415 - 420
- [9] A Survey on the Roles of Communication Technologies in IoT-Based Personalized Healthcare Applications [J]. IEEE ACCESS, 2018, 6 : 36611 - 36631
- [10] Alisic R., ARXIV200313187