{"id":"https://openalex.org/W4407783077","doi":"https://doi.org/10.1177/14727978241299239","title":"Privacy protection technology in e-commerce based on dilated convolution network model","display_name":"Privacy protection technology in e-commerce based on dilated convolution network model","publication_year":2024,"publication_date":"2024-11-08","ids":{"openalex":"https://openalex.org/W4407783077","doi":"https://doi.org/10.1177/14727978241299239"},"language":"en","primary_location":{"id":"doi:10.1177/14727978241299239","is_oa":false,"landing_page_url":"https://doi.org/10.1177/14727978241299239","pdf_url":null,"source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091135797","display_name":"Furong Huang","orcid":"https://orcid.org/0000-0001-8760-439X"},"institutions":[{"id":"https://openalex.org/I192209268","display_name":"Shaoxing University","ror":"https://ror.org/0435tej63","country_code":"CN","type":"education","lineage":["https://openalex.org/I192209268"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Furong Huang","raw_affiliation_strings":["Shaoxing University","Shangyu College, Shaoxing University, Shaoxing, China"],"affiliations":[{"raw_affiliation_string":"Shaoxing University","institution_ids":["https://openalex.org/I192209268"]},{"raw_affiliation_string":"Shangyu College, Shaoxing University, Shaoxing, China","institution_ids":["https://openalex.org/I192209268"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091135797"],"corresponding_institution_ids":["https://openalex.org/I192209268"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.51497485,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"1","first_page":"54","last_page":"66"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14139","display_name":"E-commerce and Technology Innovations","score":0.9330999851226807,"subfield":{"id":"https://openalex.org/subfields/1403","display_name":"Business and International Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14139","display_name":"E-commerce and Technology Innovations","score":0.9330999851226807,"subfield":{"id":"https://openalex.org/subfields/1403","display_name":"Business and International Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9217000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6927280426025391},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.5556700229644775},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5267909169197083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45089486241340637},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3344349265098572},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14408040046691895}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6927280426025391},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.5556700229644775},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5267909169197083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45089486241340637},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3344349265098572},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14408040046691895},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1177/14727978241299239","is_oa":false,"landing_page_url":"https://doi.org/10.1177/14727978241299239","pdf_url":null,"source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W3177694727","https://openalex.org/W3198295627","https://openalex.org/W3199617375","https://openalex.org/W3200400919","https://openalex.org/W3206194193","https://openalex.org/W3215939128","https://openalex.org/W4200042848","https://openalex.org/W4205432963","https://openalex.org/W4207014040","https://openalex.org/W4210569441","https://openalex.org/W4210722567","https://openalex.org/W4210770523","https://openalex.org/W4220656309","https://openalex.org/W4220791874","https://openalex.org/W4220808131","https://openalex.org/W4220923293","https://openalex.org/W4221049403","https://openalex.org/W4224055292","https://openalex.org/W4224257126","https://openalex.org/W4224287078","https://openalex.org/W4224321951","https://openalex.org/W4225145116","https://openalex.org/W4226166912","https://openalex.org/W4281492197","https://openalex.org/W4283588972","https://openalex.org/W4283779104","https://openalex.org/W4283800873","https://openalex.org/W4285394468","https://openalex.org/W4289731971","https://openalex.org/W4293107689","https://openalex.org/W4295972088","https://openalex.org/W4296301773","https://openalex.org/W4303709979","https://openalex.org/W4304172678","https://openalex.org/W4306804783","https://openalex.org/W4310372408","https://openalex.org/W4312609182","https://openalex.org/W4315795931","https://openalex.org/W4381622272"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2953707841","https://openalex.org/W4403547452","https://openalex.org/W1496791764","https://openalex.org/W4318485713","https://openalex.org/W2740319091","https://openalex.org/W4225340788","https://openalex.org/W33899462"],"abstract_inverted_index":{"This":[0,219],"paper":[1,92,112,128,153,188,220],"aims":[2],"to":[3,25,33,83,103,233],"investigate":[4],"and":[5,60,79,100,121,163,172,206,237],"advance":[6],"the":[7,12,17,27,48,58,85,91,105,114,123,141,147,176,182,194,203,209,239],"privacy":[8,32,43,64,86,99,107,132,142,177,214,224,244],"protection":[9,44,108,133,143,178,215,225],"techniques":[10],"within":[11,216],"e-commerce":[13,67,116,217,229],"domain":[14],"by":[15],"leveraging":[16],"dilated":[18],"convolutional":[19],"network":[20,73],"(DCN)":[21],"model.":[22,50],"It":[23],"endeavors":[24],"elevate":[26,238],"safeguarding":[28],"of":[29,37,57,87,175,193,208,242],"user":[30,88,235],"data":[31,243],"a":[34,42,72,222],"higher":[35],"level":[36,241],"security.":[38],"The":[39,135,167,197],"study":[40],"introduces":[41],"methodology":[45],"grounded":[46],"on":[47,146,181],"DCN":[49,148,183,210],"Firstly,":[51],"it":[52,70],"delves":[53],"into":[54],"an":[55],"analysis":[56],"threats":[59],"attack":[61],"vectors":[62],"concerning":[63],"security":[65],"in":[66,126,151,157,186,212],"settings.":[68],"Subsequently,":[69],"devises":[71],"model":[74,149,164,184,211],"integrating":[75],"DCN,":[76],"attention":[77],"mechanism,":[78,81],"gating":[80],"tailored":[82,227],"fortify":[84],"data.":[89],"Additionally,":[90],"incorporates":[93],"advanced":[94],"technologies":[95],"such":[96],"as":[97],"differential":[98],"encryption":[101],"algorithms":[102],"augment":[104],"data\u2019s":[106],"capabilities.":[109],"Finally,":[110],"this":[111,127,152,187],"uses":[113],"actual":[115],"dataset":[117],"for":[118,228],"experimental":[119,136,198],"evaluation":[120],"compares":[122],"method":[124],"proposed":[125,150,185],"with":[129],"other":[130],"common":[131],"methods.":[134],"results":[137],"show":[138],"that":[139,192],"(1)":[140],"technology":[144,179,226],"based":[145,180],"has":[154],"obvious":[155],"advantages":[156,207],"reconstruction":[158],"error,":[159],"information":[160],"utilization":[161],"efficiency,":[162],"efficiency.":[165],"(2)":[166],"overall":[168,240],"performance":[169],"(accuracy,":[170],"recall,":[171],"F1":[173],"value)":[174],"is":[189],"better":[190],"than":[191],"comparison":[195],"method.":[196],"findings":[199],"outlined":[200],"above":[201],"underscore":[202],"promising":[204],"potential":[205],"enhancing":[213],"platforms.":[218],"presents":[221],"robust":[223],"platforms,":[230],"which":[231],"serves":[232],"bolster":[234],"trust":[236],"protection.":[245]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
