Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Prospects and applications of photonic neural networks
Neural networks have enabled applications in artificial intelligence through machine
learning, and neuromorphic computing. Software implementations of neural networks on …
learning, and neuromorphic computing. Software implementations of neural networks on …
Multi-factor authentication: A survey
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …
enablers to maintain this process secure is authentication. It covers many different areas of a …
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …
limitations that need to be addressed in order for their deployment to be more widespread …
A comprehensive overview of biometric fusion
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …
fingerprints only) is often stymied by various factors such as poor data quality or limited …
Privacy preserving face recognition utilizing differential privacy
Facial recognition technologies are implemented in many areas, including but not limited to,
citizen surveillance, crime control, activity monitoring, and facial expression evaluation …
citizen surveillance, crime control, activity monitoring, and facial expression evaluation …
Methods and apparatus for rules-based multi-factor verification
K Alikhani - US Patent 9,426,132, 2016 - Google Patents
5,761.329 A 6, 1998 Chen et al. 2009/0320123 A1 12/2009 Yu et al. 6,463,474 B1 10/2002
Fuh et al. 2010.0005529 A1 1/2010 Hemade 6,671,812 B1 12/2003 Balasubramaniam et al …
Fuh et al. 2010.0005529 A1 1/2010 Hemade 6,671,812 B1 12/2003 Balasubramaniam et al …
Secure biometric authentication with de-duplication on distributed cloud storage
Cloud computing is one of the evolving fields of technology, which allows storage, access of
data, programs, and their execution over the internet with offering a variety of information …
data, programs, and their execution over the internet with offering a variety of information …
Biometric systems utilising health data from wearable devices: Applications and future challenges in computer security
Health data are being increasingly sensed from the health-based wearable Internet of
Things (IoT) devices, providing much-needed fitness and health tracking. However, data …
Things (IoT) devices, providing much-needed fitness and health tracking. However, data …
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
As part of the security within distributed systems, various services and resources need
protection from unauthorized use. Remote authentication is the most commonly used …
protection from unauthorized use. Remote authentication is the most commonly used …
On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services
Q Jiang, J Ma, F Wei - IEEE systems journal, 2016 - ieeexplore.ieee.org
Recently, Tsai and Lo proposed a privacy aware authentication scheme for distributed
mobile cloud computing services. It is claimed that the scheme achieves mutual …
mobile cloud computing services. It is claimed that the scheme achieves mutual …