2023
DOI: 10.1109/tii.2022.3197201
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…However, it had always been inefficient. Khan et al (2021) and Li et al (2022) adopted suppression method to cut off the correlation between user location and time to protect the trajectory privacy of users. In this method, k tasks were selected from n tasks completed by the user and uploaded to the server in an out-of-order combination (Nie et al, 2021;Khan et al, 2022).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it had always been inefficient. Khan et al (2021) and Li et al (2022) adopted suppression method to cut off the correlation between user location and time to protect the trajectory privacy of users. In this method, k tasks were selected from n tasks completed by the user and uploaded to the server in an out-of-order combination (Nie et al, 2021;Khan et al, 2022).…”
Section: Related Workmentioning
confidence: 99%
“…Traditional location privacy protection technologies include space concealment (Anh et al, 2010;Liu et al, 2021), location offset and blurring (Freudiger et al, 2013;Pournaras et al, 2016), and forging false location (Gao et al, 2022), etc. However, these technologies require forgery or modification of data acquisition location or time, which will affect the availability of crowdsensing task data.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of computer science and Internet technology, a large amount of data is produced all over the world all the time, such as, text, audio, pictures, videos and so on. Big data contains a lot of information, but this information is difficult to identify and organize manually (Li et al 2023;Huang et al 2021). Therefore, how to classify and identify information has been concerned and studied by many researchers.…”
Section: Introductionmentioning
confidence: 99%
“…Data recorded in HMI during the DOL mode of operation was accessed remotely, monitoring and data analysis [63].…”
mentioning
confidence: 99%