{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:16:12Z","timestamp":1771002972185,"version":"3.50.1"},"reference-count":40,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Methods in Sciences and Engineering"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>This paper aims to investigate and advance the privacy protection techniques within the e-commerce domain by leveraging the dilated convolutional network (DCN) model. It endeavors to elevate the safeguarding of user data privacy to a higher level of security. The study introduces a privacy protection methodology grounded on the DCN model. Firstly, it delves into an analysis of the threats and attack vectors concerning privacy security in e-commerce settings. Subsequently, it devises a network model integrating DCN, attention mechanism, and gating mechanism, tailored to fortify the privacy of user data. Additionally, the paper incorporates advanced technologies such as differential privacy and encryption algorithms to augment the data\u2019s privacy protection capabilities. Finally, this paper uses the actual e-commerce dataset for experimental evaluation and compares the method proposed in this paper with other common privacy protection methods. The experimental results show that (1) the privacy protection technology based on the DCN model proposed in this paper has obvious advantages in reconstruction error, information utilization efficiency, and model efficiency. (2) The overall performance (accuracy, recall, and F1 value) of the privacy protection technology based on the DCN model proposed in this paper is better than that of the comparison method. The experimental findings outlined above underscore the promising potential and advantages of the DCN model in enhancing privacy protection within e-commerce platforms. This paper presents a robust privacy protection technology tailored for e-commerce platforms, which serves to bolster user trust and elevate the overall level of data privacy protection.<\/jats:p>","DOI":"10.1177\/14727978241299239","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T06:08:17Z","timestamp":1740031697000},"page":"54-66","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy protection technology in e-commerce based on dilated convolution network model"],"prefix":"10.1177","volume":"25","author":[{"given":"Furong","family":"Huang","sequence":"first","affiliation":[{"name":"Shaoxing University"}]}],"member":"179","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13021020"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.5010"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-022-00537-z"},{"issue":"03","key":"e_1_3_2_5_2","first-page":"1713","article-title":"Implementation of the e-commerce platform to improve technology adaptation in MSMES","volume":"11","author":"Cakranegara PA","year":"2022","unstructured":"Cakranegara PA, Zuana MMM, Sestri E, et al. Implementation of the e-commerce platform to improve technology adaptation in MSMES. Jurnal Ekonomi 2022; 11(03): 1713\u20131719.","journal-title":"Jurnal Ekonomi"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.33050\/sabda.v2i1.273"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/su14074374"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2021.1975172"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-021-04884-3"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.20473\/jmtt.v15i1.34923"},{"issue":"2","key":"e_1_3_2_11_2","first-page":"196","article-title":"Education on the legal aspects of consumer protection in buying and selling transactions in the electronic-based Millennial 5.0 era (E-Commerce)","volume":"5","author":"Rizal SS","year":"2022","unstructured":"Rizal SS, Alnoor FO, Laily K. Education on the legal aspects of consumer protection in buying and selling transactions in the electronic-based Millennial 5.0 era (E-Commerce). IJECA (Internat J Edu Curricu App) 2022; 5(2): 196\u2013210.","journal-title":"IJECA (Internat J Edu Curricu App)"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.37547\/tajpslc\/Volume04Issue02-09"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12836-w"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.3390\/su142315918"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.306271"},{"issue":"2","key":"e_1_3_2_16_2","first-page":"1123","article-title":"An analysis of increased usage of e-commerce during COVID-19","volume":"25","author":"Alkhunaizan AS","year":"2022","unstructured":"Alkhunaizan AS, Ali A. An analysis of increased usage of e-commerce during COVID-19. Ind J Ele Eng Comp Scie 2022; 25(2): 1123\u20131130.","journal-title":"Ind J Ele Eng Comp Scie"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2022.100111"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.3390\/info13100479"},{"issue":"4","key":"e_1_3_2_19_2","first-page":"485","article-title":"Combining MobileNetV1 and Depthwise Separable convolution bottleneck with Expansion for classifying the freshness of fish eyes","volume":"9","author":"Prasetyo E","year":"2022","unstructured":"Prasetyo E, Purbaningtyas R, Adityo RD, et al. Combining MobileNetV1 and Depthwise Separable convolution bottleneck with Expansion for classifying the freshness of fish eyes. Informat Proc Agricu 2022; 9(4): 485\u2013496.","journal-title":"Informat Proc Agricu"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3142771"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2022.3168670"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6560\/ac72f0"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs14195063"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2022.10.002"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1002\/ange.202201908"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12147066"},{"issue":"7","key":"e_1_3_2_27_2","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jcis.2022.06.142","article-title":"V2CTx MXene as novel anode for aqueous asymmetric supercapacitor with superb durability in ZnSO4 electrolyte","volume":"626","author":"Chen W","year":"2022","unstructured":"Chen W, Zhang L, Ren H, et al. V2CTx MXene as novel anode for aqueous asymmetric supercapacitor with superb durability in ZnSO4 electrolyte. J Colloid Interface Sci 2022; 626(7): 59\u201367.","journal-title":"J Colloid Interface Sci"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bbe.2022.05.003"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bpj.2022.07.032"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jafc.1c07557"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcin.2022.07.034"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1002\/ieam.4516"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-29549-1"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkac361"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1152\/physrev.00022.2021"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.abm3942"},{"issue":"1","key":"e_1_3_2_37_2","first-page":"542","article-title":"Complementary attention gated network for pedestrian trajectory prediction","volume":"36","author":"Duan J","year":"2022","unstructured":"Duan J, Wang L, Long C, et al. Complementary attention gated network for pedestrian trajectory prediction. Proc AAAI Conf Artif Intell 2022; 36(1): 542\u2013550.","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2022.2026295"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22082932"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.11.006"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.015"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978241299239","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14727978241299239","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978241299239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:31:07Z","timestamp":1771000267000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14727978241299239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,8]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1177\/14727978241299239"],"URL":"https:\/\/doi.org\/10.1177\/14727978241299239","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,8]]}}}