Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
When machine learning meets privacy in 6G: A survey
The rapid-develo** Artificial Intelligence (AI) technology, fast-growing network traffic, and
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …
Anticipatory mobile computing: A survey of the state of the art and research challenges
Today's mobile phones are far from the mere communication devices they were 10 years
ago. Equipped with sophisticated sensors and advanced computing hardware, phones can …
ago. Equipped with sophisticated sensors and advanced computing hardware, phones can …
Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics
AK Sangaiah, DV Medhane, T Han… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Position-based services (PBSs) that deliver networked amenities based on roaming user's
positions have become progressively popular with the propagation of smart mobile devices …
positions have become progressively popular with the propagation of smart mobile devices …
Transportation mode detection using mobile phones and GIS information
The transportation mode such as walking, cycling or on a train denotes an important
characteristic of the mobile user's context. In this paper, we propose an approach to inferring …
characteristic of the mobile user's context. In this paper, we propose an approach to inferring …
Building the internet of things using RFID: the RFID ecosystem experience
At the University of Washington, the RFID Ecosystem creates a microcosm for the Internet of
Things. The authors developed a suite of Web-based, user-level tools and applications …
Things. The authors developed a suite of Web-based, user-level tools and applications …
A survey of computational location privacy
J Krumm - Personal and Ubiquitous Computing, 2009 - Springer
This is a literature survey of computational location privacy, meaning computation-based
privacy mechanisms that treat location data as geometric information. This definition …
privacy mechanisms that treat location data as geometric information. This definition …
Inference attacks on location tracks
J Krumm - International Conference on Pervasive Computing, 2007 - Springer
Although the privacy threats and countermeasures associated with location data are well
known, there has not been a thorough experiment to assess the effectiveness of either. We …
known, there has not been a thorough experiment to assess the effectiveness of either. We …
Sail: Single access point-based indoor localization
This paper presents SAIL, a Single Access Point Based Indoor Localization system.
Although there have been advances in WiFi-based positioning techniques, we find that …
Although there have been advances in WiFi-based positioning techniques, we find that …
Identifying important places in people's lives from cellular network data
People spend most of their time at a few key locations, such as home and work. Being able
to identify how the movements of people cluster around these “important places” is crucial …
to identify how the movements of people cluster around these “important places” is crucial …
Indoor localization without infrastructure using the acoustic background spectrum
We introduce a new technique for determining a mobile phone's indoor location even when
Wi-Fi infrastructure is unavailable or sparse. Our technique is based on a new ambient …
Wi-Fi infrastructure is unavailable or sparse. Our technique is based on a new ambient …