Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on interdependent privacy
The privacy of individuals does not only depend on their own actions and data but may also
be affected by the privacy decisions and by the data shared by other individuals. This …
be affected by the privacy decisions and by the data shared by other individuals. This …
Survey on access control for community-centered collaborative systems
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …
collaborative systems and platforms. These systems and platforms aim to provide an …
Big data security and privacy
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …
make today possible to collect huge amounts of data. However, for data to be used to their …
An attribute-based controlled collaborative access control scheme for public cloud storage
In public cloud storage services, data are outsourced to semi-trusted cloud servers which
are outside of data owners' trusted domain. To prevent untrustworthy service providers from …
are outside of data owners' trusted domain. To prevent untrustworthy service providers from …
Blockchain-based multi-party authorization for accessing IPFS encrypted data
Multi-party authorization (MPA) typically involves multiple parties to control and grant access
to shared data. MPA is used to solve the insider's attack problem by ensuring that a single …
to shared data. MPA is used to solve the insider's attack problem by ensuring that a single …
Decentralized privacy preserving services for online social networks
Current popular and widely adopted Online Social Networks (OSNs) all follow a logically
centered architecture, by which one single entity owns unprecedented collections of …
centered architecture, by which one single entity owns unprecedented collections of …
An efficient ciphertext-policy attribute-based encryption scheme supporting collaborative decryption with blockchain
In the last few decades, ciphertext-policy attribute-based encryption (CP-ABE) technology
has attracted great interest, since it can provide fine-grained, flexible, and access control for …
has attracted great interest, since it can provide fine-grained, flexible, and access control for …
Assisting humans in privacy management: an agent-based approach
Image sharing is a service offered by many online social networks. In order to preserve
privacy of images, users need to think through and specify a privacy setting for each image …
privacy of images, users need to think through and specify a privacy setting for each image …
“I thought you were okay”: Participatory Design with Young Adults to Fight Multiparty Privacy Conflicts in Online Social Networks
Although sharing multimedia content on online social networks (OSNs) has many benefits,
publishing photos or videos of other people—without obtaining permission—can cause …
publishing photos or videos of other people—without obtaining permission—can cause …
On the potential of mediation chatbots for mitigating multiparty privacy conflicts-a wizard-of-Oz study
Sharing multimedia content, without obtaining consent from the people involved causes
multiparty privacy conflicts (MPCs). However, social-media platforms do not proactively …
multiparty privacy conflicts (MPCs). However, social-media platforms do not proactively …