Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Private analytics via streaming, sketching, and silently verifiable proofs
We present Whisper, a system for privacy-preserving collection of aggregate statistics. Like
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …
PLASMA: Private, lightweight aggregated statistics against malicious adversaries
D Mouris, P Sarkar, NG Tsoutsos - Proceedings on Privacy …, 2024 - petsymposium.org
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …
strings, and data-collection servers aim to identify the most popular strings without learning …
Secure statistical analysis on multiple datasets: Join and group-by
We implement a secure platform for statistical analysis over multiple organizations and
multiple datasets. We provide a suite of protocols for different variants of JOIN and GROUP …
multiple datasets. We provide a suite of protocols for different variants of JOIN and GROUP …
{TVA}: A multi-party computation system for secure and expressive time series analytics
We present TVA, a multi-party computation (MPC) system for secure analytics on secret-
shared time series data. TVA achieves strong security guarantees in the semi-honest and …
shared time series data. TVA achieves strong security guarantees in the semi-honest and …
Secret-shared shuffle with malicious security
A secret-shared shuffle (SSS) protocol permutes a secret-shared vector using a random
secret permutation. It has found numerous applications, however, it is also an expensive …
secret permutation. It has found numerous applications, however, it is also an expensive …
Efficient permutation correlations and batched random access for two-party computation
In this work we formalize the notion of a two-party permutation correlation $(A, B),(C,\pi) $ st
$\pi (A)= B+ C $ for a random permutation $\pi $ of $ n $ elements and vectors $ A, B …
$\pi (A)= B+ C $ for a random permutation $\pi $ of $ n $ elements and vectors $ A, B …
Mastic: Private weighted heavy-hitters and attribute-based metrics
D Mouris, C Patton, H Davis, P Sarkar… - … on Privacy Enhancing …, 2025 - petsymposium.org
Insight into user experience and behavior is critical to the success of large software systems
and web services. Gaining such insights, while preserving user privacy, is a significant …
and web services. Gaining such insights, while preserving user privacy, is a significant …
{GraphGuard}: Private {Time-Constrained} Pattern Detection Over Streaming Graphs in the Cloud
Streaming graphs have seen wide adoption in diverse scenarios due to their superior ability
to capture temporal interactions among entities. With the proliferation of cloud computing, it …
to capture temporal interactions among entities. With the proliferation of cloud computing, it …
Privacy-preserving dijkstra
B Ostrovsky - Annual International Cryptology Conference, 2024 - Springer
Given a graph G (V, E), represented as a secret-sharing of an adjacency list, we show how
to obliviously convert it into an alternative, MPC-friendly secret-shared representation, so …
to obliviously convert it into an alternative, MPC-friendly secret-shared representation, so …
Secure sampling for approximate multi-party query processing
We study the problem of random sampling in the secure multi-party computation (MPC)
model. In MPC, taking a sample securely must have a cost Ω (n) irrespective to the sample …
model. In MPC, taking a sample securely must have a cost Ω (n) irrespective to the sample …