Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trustworthy AI: From principles to practices
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …
of various systems based on it. However, many current AI systems are found vulnerable to …
The foundation model transparency index
Foundation models have rapidly permeated society, catalyzing a wave of generative AI
applications spanning enterprise and consumer-facing contexts. While the societal impact of …
applications spanning enterprise and consumer-facing contexts. While the societal impact of …
Smartphone-based DNA diagnostics for malaria detection using deep learning for local decision support and blockchain technology for security
In infectious disease diagnosis, results need to be communicated rapidly to healthcare
professionals once testing has been completed so that care pathways can be implemented …
professionals once testing has been completed so that care pathways can be implemented …
Securely outsourcing neural network inference to the cloud with lightweight techniques
Neural network (NN) inference services enrich many applications, like image classification,
object recognition, facial verification, and more. These NN inference services are …
object recognition, facial verification, and more. These NN inference services are …
Guarding machine learning hardware against physical side-channel attacks
Machine learning (ML) models can be trade secrets due to their development cost. Hence,
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …
Exploring design and governance challenges in the development of privacy-preserving computation
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …
an emerging class of Privacy Enhancing Technologies which share a common promise: to …
Visual privacy protection in mobile image recognition using protective perturbation
Deep neural networks (DNNs) have been widely adopted in mobile image recognition
applications. Considering intellectual property and computation resources, the image …
applications. Considering intellectual property and computation resources, the image …
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits
A universal circuit (UC) can be thought of as a programmable circuit that can simulate any
circuit up to a certain size by specifying its secret configuration bits. UCs have been …
circuit up to a certain size by specifying its secret configuration bits. UCs have been …
A Guide for Trustworthy AI Implementations in the Smart Living Domain
Advances in AI facilitate the development of numerous smart solutions that significantly
enhance efficiency and comfort for organizations and individual users. However, AI systems …
enhance efficiency and comfort for organizations and individual users. However, AI systems …
Intelligent Information Technology for Obtaining Trust Decisions Based on the Ontology of Trust in a Human-Centered Approach
Е МАНЗЮК - Computer systems and information …, 2022 - csitjournal.khmnu.edu.ua
The paper presents the results of research on the development of intelligent information
technology for obtaining trust decisions to determine the constituent elements and the …
technology for obtaining trust decisions to determine the constituent elements and the …