Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Content delivery network security: A survey
A content delivery network (CDN) is a distributed infrastructure to deliver digital contents to
end users with high performance. CDNs are critical to provide and protect the availability of …
end users with high performance. CDNs are critical to provide and protect the availability of …
Indistinguishability obfuscation from well-founded assumptions
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …
programs into unintelligible ones while preserving functionality. It is a fascinating and …
Pad-net: Multi-tasks guided prediction-and-distillation network for simultaneous depth estimation and scene parsing
Depth estimation and scene parsing are two particularly important tasks in visual scene
understanding. In this paper we tackle the problem of simultaneous depth estimation and …
understanding. In this paper we tackle the problem of simultaneous depth estimation and …
Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
Succinct {Non-Interactive} zero knowledge for a von neumann architecture
We build a system that provides succinct non-interactive zero-knowledge proofs (zk-
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
SNARKs for C: Verifying program executions succinctly and in zero knowledge
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …
statements, given proofs produced by an untrusted yet computationally-bounded prover …
Blindbox: Deep packet inspection over encrypted traffic
Many network middleboxes perform deep packet inspection (DPI), a set of useful tasks
which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration …
which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration …
Two halves make a whole: Reducing data transfer in garbled circuits using half gates
The well-known classical constructions of garbled circuits use four ciphertexts per gate,
although various methods have been proposed to reduce this cost. The best previously …
although various methods have been proposed to reduce this cost. The best previously …
Function secret sharing
Motivated by the goal of securely searching and updating distributed data, we introduce and
study the notion of function secret sharing (FSS). This new notion is a natural generalization …
study the notion of function secret sharing (FSS). This new notion is a natural generalization …