Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Differential privacy techniques for cyber physical systems: A survey
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …
development of information and communication technologies (ICT). With the provision of …
A Survey of Self‐Sovereign Identity Ecosystem
Self‐sovereign identity is the next evolution of identity management models. This survey
takes a journey through the origin of identity, defining digital identity and progressive …
takes a journey through the origin of identity, defining digital identity and progressive …
Machine learning models that remember too much
Machine learning (ML) is becoming a commodity. Numerous ML frameworks and services
are available to data holders who are not ML experts but want to train predictive models on …
are available to data holders who are not ML experts but want to train predictive models on …
[หนังสือ][B] Data mining: the textbook
CC Aggarwal - 2015 - Springer
This textbook explores the different aspects of data mining from the fundamentals to the
complex data types and their applications, capturing the wide diversity of problem domains …
complex data types and their applications, capturing the wide diversity of problem domains …
Information security in big data: privacy and data mining
The growing popularity and development of data mining technologies bring serious threat to
the security of individual,'s sensitive information. An emerging research topic in data mining …
the security of individual,'s sensitive information. An emerging research topic in data mining …
Privacy-preserving data mining: methods, metrics, and applications
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …
computing devices. The analysis of such information is fostering businesses and …
[HTML][HTML] An efficient CNN based epileptic seizures detection framework using encrypted EEG signals for secure telemedicine applications
Recently, the rapid development of Artificial Intelligence (AI) applied in the Medical Internet
of Things (MIoT) for the diagnosis of diseases such as epilepsy based on the investigation of …
of Things (MIoT) for the diagnosis of diseases such as epilepsy based on the investigation of …
Petuum: A new platform for distributed machine learning on big data
How can one build a distributed framework that allows efficient deployment of a wide
spectrum of modern advanced machine learning (ML) programs for industrial-scale …
spectrum of modern advanced machine learning (ML) programs for industrial-scale …
Anonymousnet: Natural face de-identification with measurable privacy
With billions of personal images being generated from social media and cameras of all sorts
on a daily basis, security and privacy are unprecedentedly challenged. Although extensive …
on a daily basis, security and privacy are unprecedentedly challenged. Although extensive …
Big privacy: Challenges and opportunities of privacy study in the age of big data
S Yu - IEEE access, 2016 - ieeexplore.ieee.org
One of the biggest concerns of big data is privacy. However, the study on big data privacy is
still at a very early stage. We believe the forthcoming solutions and theories of big data …
still at a very early stage. We believe the forthcoming solutions and theories of big data …