Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure multi-party protocols for item-based collaborative filtering
Recommender systems have become extremely common in recent years, and are utilized in
a variety of domains such as movies, music, news, products, restaurants, etc. While a typical …
a variety of domains such as movies, music, news, products, restaurants, etc. While a typical …
Quantitative computation of social strength in Social Internet of Things
Recently, the emerging Social Internet of Things (SIoT) has opened up a myriad of research
opportunities. One of the most fundamental research challenges posed by SIoT and its …
opportunities. One of the most fundamental research challenges posed by SIoT and its …
Find thy neighbourhood: Privacy-preserving local clustering
Identifying a cluster around a seed node in a graph, termed local clustering, finds use in
several applications, including fraud detection, targeted advertising, community detection …
several applications, including fraud detection, targeted advertising, community detection …
Mediated secure multi-party protocols for collaborative filtering
Recommender systems have become extremely common in recent years and are utilized in
a variety of domains such as movies, music, news, products, restaurants, and so on. While a …
a variety of domains such as movies, music, news, products, restaurants, and so on. While a …
Fairness-driven private collaborative machine learning
The performance of machine learning algorithms can be considerably improved when
trained over larger datasets. In many domains, such as medicine and finance, larger …
trained over larger datasets. In many domains, such as medicine and finance, larger …
Privacy-preserving collaborative filtering by distributed mediation
T Tassa, AB Horin - ACM Transactions on Intelligent Systems and …, 2022 - dl.acm.org
Recommender systems have become very influential in our everyday decision making, eg,
hel** us choose a movie from a content platform, or offering us suitable products on e …
hel** us choose a movie from a content platform, or offering us suitable products on e …
Privacy-preserving planarity testing of distributed graphs
G Barshap, T Tassa - Data and Applications Security and Privacy XXXII …, 2018 - Springer
We study the problem of privacy-preserving planarity testing of distributed graphs. The
setting involves several parties that hold private graphs on the same set of vertices, and an …
setting involves several parties that hold private graphs on the same set of vertices, and an …
[PDF][PDF] Secure Voting Protocols with Perfect Ballot Secrecy.
Securing voters' privacy and ensuring the integrity of the voting process are major design
goals in voting systems. We propose secure voting protocols for two families of voting rules …
goals in voting systems. We propose secure voting protocols for two families of voting rules …
秘密区间与阈值的保密判定.
成雯, **顺东, 王文丽 - … of Frontiers of Computer Science & …, 2020 - search.ebscohost.com
安全多方计算(SMC) 是密码学领域**年来的研究热点, 是信息安全保护的关键技术.
区间安全多方计算问题在密码学中具有重要的理论意义. 之前的研究很少涉及到秘密区间 …
区间安全多方计算问题在密码学中具有重要的理论意义. 之前的研究很少涉及到秘密区间 …
[CITAZIONE][C] Privacy-Preserving Determination of Secret Interval and Threshold
C Wen, LI Shundong, W Wenli - Journal of Frontiers of Computer Science & …, 2020