.- High-Efficiency Phase-Index Correlation Delay Shift Keying Modulation.
.- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity.
.- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids.
.- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling.
.- Comparative Study of Machine Learning Approaches for Phishing Website Detection.
.- Exploring Interpretability in Backdoor Attacks on Image.
.- Attribute-Based Secret Key Signature Scheme.
.- Digital token transaction tracing method.
.- GPT-based WebAssembly Instruction Analysis for Program Language Processing.
.- Research on Key Technologies of Fair Deep Learning.
.- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning.
.- Cascading failures model with noise interference in supply chain networks.
.- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction.
.- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences.
.- Blockchain-based key management scheme in Internet of Things.
.- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework.
.- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting.
.- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing.