Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Visual content privacy protection: A survey
Vision is the most important sense for people, and it is also one of the main ways of
cognition. As a result, people tend to utilize visual content to capture and share their life …
cognition. As a result, people tend to utilize visual content to capture and share their life …
[HTML][HTML] Real time hybrid medical image encryption algorithm combining memristor-based chaos with DNA coding
Image encryption is a commonly used method to secure medical data on a public network,
playing a crucial role in the healthcare industry. Because of their complex dynamics …
playing a crucial role in the healthcare industry. Because of their complex dynamics …
Mosaic tracking: Lightweight batch video frame awareness multi-target encryption scheme based on a novel discrete tabu learning neuron and yolov5
With the popularity of surveillance devices, the security of surveillance video has attracted
much attention, and three key issues need to be solved. The videos cannot be synchronized …
much attention, and three key issues need to be solved. The videos cannot be synchronized …
An intelligent indoor emergency evacuation system using IoT-enabled WSNs for smart buildings
Recently, the Internet of Things (IoT) has played a vital role in emergency evacuation
systems for smart buildings. Existing emergency evacuation systems do not consider future …
systems for smart buildings. Existing emergency evacuation systems do not consider future …
Real-time event-driven road traffic monitoring system using CCTV video analytics
Closed-circuit television (CCTV) systems have become pivotal tools in modern urban
surveillance and traffic management, contributing significantly to road safety and security …
surveillance and traffic management, contributing significantly to road safety and security …
Quality guided metric learning for domain adaptation person re-identification
Person re-identification is the task of identifying pedestrians across different cameras.
Domain adaptation person re-identification involves transferring knowledge from labeled …
Domain adaptation person re-identification involves transferring knowledge from labeled …
[BOK][B] Evolution and Advances in Computing Technologies for Industry 6.0: Technology, Practices, and Challenges
This book provides a comprehensive exploration of Industry 6.0, which marks the
convergence of intelligent systems, machine learning (ML), deep learning, and human …
convergence of intelligent systems, machine learning (ML), deep learning, and human …
A novel chaotic map-based encryption scheme for surveillance videos
D Dhingra, M Dua - Physica Scripta, 2023 - iopscience.iop.org
The widespread use of surveillance cameras has initiated privacy concerns among
individuals being captured by these devices. Due to the limited internal storage capacity …
individuals being captured by these devices. Due to the limited internal storage capacity …
[HTML][HTML] Pixel tampering detection in encrypted surveillance videos on resource-constrained devices
Encryption (naïve/selective) is recommended to secure the recorded visual content;
however, intruders can still manipulate encrypted data. Visually, tampering attacks on …
however, intruders can still manipulate encrypted data. Visually, tampering attacks on …
Progressive supervised pedestrian detection algorithm for green edge–cloud computing
L She, W Wang, J Wang, Z Lin, Y Zeng - Computer Communications, 2024 - Elsevier
In this paper, we present a novel supervised pedestrian detection algorithm tailored for
Green Edge–Cloud Computing (GECC), aimed at addressing the challenges associated …
Green Edge–Cloud Computing (GECC), aimed at addressing the challenges associated …