Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
When machine learning meets blockchain: A decentralized, privacy-preserving and secure design
With the onset of the big data era, designing efficient and effective machine learning
algorithms to analyze large-scale data is in dire need. In practice, data is typically generated …
algorithms to analyze large-scale data is in dire need. In practice, data is typically generated …
Secure and efficient outsourcing of PCA-based face recognition
Face recognition has become increasingly popular in recent years. However, in some
special cases, many face recognition calculations cannot be performed effectively due to the …
special cases, many face recognition calculations cannot be performed effectively due to the …
Client-side embedding of screen-shooting resilient image watermarking
The proliferation of portable camera devices, represented by smartphones, is increasing the
risk of sensitive internal data being leaked by screen shooting. To trace the leak source, a lot …
risk of sensitive internal data being leaked by screen shooting. To trace the leak source, a lot …
Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression
Linear Regression (LR) is a classical machine learning algorithm which has many
applications in the cyber physical social systems (CPSS) to shape and simplify the way we …
applications in the cyber physical social systems (CPSS) to shape and simplify the way we …
Privacy-preserving face recognition with multi-edge assistance for intelligent security systems
W Gao, J Yu, R Hao, F Kong… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Face recognition is one of the key technologies in intelligent security systems. Data privacy
and identification efficiency have always been concerns about face recognition. Existing …
and identification efficiency have always been concerns about face recognition. Existing …
Outsourcing LDA-based face recognition to an untrusted cloud
Face recognition has been extensively employed in practice, such as attendance system
and public security. Linear discriminant analysis (LDA) algorithm is one of the most …
and public security. Linear discriminant analysis (LDA) algorithm is one of the most …
Secure edge-aided singular value decomposition in internet of things
Singular value decomposition (SVD) is a widely applied foundational decomposition
technique; however, its computational demands often exceed the capabilities of Internet of …
technique; however, its computational demands often exceed the capabilities of Internet of …
Secure edge-aided computations for social internet-of-things systems
Devices in the Internet-of-Things (IoT) are networked and perform massive computations to
support various social IoT systems. Applications in social IoT systems often involve …
support various social IoT systems. Applications in social IoT systems often involve …
Cloud storage for electronic health records based on secret sharing with verifiable reconstruction outsourcing
Deploying electronic health records (EHRs) is now an undisputable trend in healthcare
systems. Through affording benefits like flexibility and low cost, the cutting-cloud cloud …
systems. Through affording benefits like flexibility and low cost, the cutting-cloud cloud …
Practical and secure outsourcing algorithms for solving quadratic congruences in Internet of Things
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …