Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Modern privacy-preserving record linkage techniques: An overview
Record linkage is the challenging task of deciding which records, coming from disparate
data sources, refer to the same entity. Established back in 1946 by Halbert L. Dunn, the area …
data sources, refer to the same entity. Established back in 1946 by Halbert L. Dunn, the area …
Fuzzy keyword search over encrypted data in cloud computing
As Cloud Computing becomes prevalent, more and more sensitive information are being
centralized into the cloud. For the protection of data privacy, sensitive data usually have to …
centralized into the cloud. For the protection of data privacy, sensitive data usually have to …
Efficient private matching and set intersection
We consider the problem of computing the intersection of private datasets of two parties,
where the datasets contain lists of elements taken from a large domain. This problem has …
where the datasets contain lists of elements taken from a large domain. This problem has …
Data streams: Algorithms and applications
S Muthukrishnan - Foundations and Trends® in Theoretical …, 2005 - nowpublishers.com
In the data stream scenario, input arrives very rapidly and there is limited memory to store
the input. Algorithms have to work with one or few passes over the data, space less than …
the input. Algorithms have to work with one or few passes over the data, space less than …
Bumblebee: Secure two-party inference framework for large transformers
Large transformer-based models have realized state-of-the-art performance on lots of real-
world tasks such as natural language processing and computer vision. However, with the …
world tasks such as natural language processing and computer vision. However, with the …
Extending oblivious transfers efficiently
We consider the problem of extending oblivious transfers: Given a small number of oblivious
transfers “for free,” can one implement a large number of oblivious transfers? Beaver has …
transfers “for free,” can one implement a large number of oblivious transfers? Beaver has …
Privacy preserving data mining
In this paper we introduce the concept of privacy preserving data mining. In our model, two
parties owning confidential databases wish to run a data mining algorithm on the union of …
parties owning confidential databases wish to run a data mining algorithm on the union of …
Practical privacy: the SuLQ framework
We consider a statistical database in which a trusted administrator introduces noise to the
query responses with the goal of maintaining privacy of individual database entries. In such …
query responses with the goal of maintaining privacy of individual database entries. In such …
A statistical framework for differential privacy
One goal of statistical privacy research is to construct a data release mechanism that
protects individual privacy while preserving information content. An example is a random …
protects individual privacy while preserving information content. An example is a random …
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (eg, GPS) can ask location-dependent
queries to Location Based Services (LBS). To protect privacy, the user location must not be …
queries to Location Based Services (LBS). To protect privacy, the user location must not be …