Author:
Kou Xiaoyu,Wang Fengwei,Zhu Hui,Zheng Yandong,Yang Xiaopeng,Liu Zhe
Funder
National Key Research and Development Program of China,China国家重点研发计划,中国
National Natural Science Foundation of China
Shaanxi Provincial Key Research and Development Program
Science and Technology on Communication Networks Laboratory
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Duggineni S (2023) Impact of controls on data integrity and information systems. Sci Technol 13(2):29–35
2. Xu Q, Zhu H, Zheng Y, Wang F, Gao L (2024) Practical and Privacy-Preserving Geo-Social-Based POI Recommendation. J Inf Intell 2(2):148–166
3. Zheng Z, Wang Q, Wang C (2023) Spoofing attacks and anti-spoofing methods for face authentication over smartphones. IEEE Commun Mag 61(12):213–219
4. Sharma D, Selwal A (2023) A survey on face presentation attack detection mechanisms: hitherto and future perspectives. Multim Syst 29(3):1527–1577
5. Lü Q, Liao X, Li H, Huang T (2020) A computation-efficient decentralized algorithm for composite constrained optimization. IEEE Trans Signal Inf Process Netw 6:774–789