Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning classification over encrypted data
Abstract Machine learning classification is used in numerous settings nowadays, such as
medical or genomics predictions, spam detection, face recognition, and financial predictions …
medical or genomics predictions, spam detection, face recognition, and financial predictions …
Predicting students' GPA and develo** intervention strategies based on self-regulatory learning behaviors
Predicting students' grades has emerged as a major area of investigation in education due
to the desire to identify the underlying factors that influence academic performance. Because …
to the desire to identify the underlying factors that influence academic performance. Because …
[PDF][PDF] Foundations of sum-product networks for probabilistic modeling
R Peharz - 2015 - cse.iitd.ac.in
Sum-product networks (SPNs) are a promising and novel type of probabilistic model, which
has been receiving significant attention in recent years. There are, however, several open …
has been receiving significant attention in recent years. There are, however, several open …
[KÖNYV][B] Machine learning under resource constraints
Machine learning under resource constraints Katharina Morik, Peter Marwedel (Eds.) Machine
Learning under Resource Constraints· Fundamentals Page 2 Also of interest Volume 2 …
Learning under Resource Constraints· Fundamentals Page 2 Also of interest Volume 2 …
RETRACTED ARTICLE: Intelligent recommendation method integrating knowledge graph and Bayesian network
H Pan, X Yang - Soft Computing, 2023 - Springer
In recent years, the amount of Internet information data has exploded, and the problem of
“information overload” has become a huge challenge for Internet development. Through the …
“information overload” has become a huge challenge for Internet development. Through the …
Efficient machine learning over encrypted data with non-interactive communication
In this paper, we describe a protocol framework that can perform classification tasks in a
privacy-preserving manner. To demonstrate the feasibility of the proposed framework, we …
privacy-preserving manner. To demonstrate the feasibility of the proposed framework, we …
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols
We propose an efficient unconditionally secure protocol for privacy preserving comparison
of ℓ ℓ-bit integers when both integers are shared between two semi-honest parties. Using …
of ℓ ℓ-bit integers when both integers are shared between two semi-honest parties. Using …
Problp: A framework for low-precision probabilistic inference
Bayesian reasoning is a powerful mechanism for probabilistic inference in smart edge-
devices. During such inferences, a low-precision arithmetic representation can enable …
devices. During such inferences, a low-precision arithmetic representation can enable …
A secure encryption-based malware detection system
Z Lin, F **ao, Y Sun, Y Ma, CC **ng… - KSII Transactions on …, 2018 - koreascience.kr
Malware detections continue to be a challenging task as attackers may be aware of the rules
used in malware detection mechanisms and constantly generate new breeds of malware to …
used in malware detection mechanisms and constantly generate new breeds of malware to …
Architecting for causal intelligence at nanoscale
Conventional Von Neumann microprocessors are inefficient for supporting machine
intelligence due to layers of abstraction, limiting the feasibility of machine-learning …
intelligence due to layers of abstraction, limiting the feasibility of machine-learning …