Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …
recent years because of their potential to improve data availability and unlock new business …
Oblivious neural network predictions via minionn transformations
Machine learning models hosted in a cloud service are increasingly popular but risk privacy:
clients sending prediction requests to the service need to disclose potentially sensitive …
clients sending prediction requests to the service need to disclose potentially sensitive …
GMW vs. Yao? Efficient secure two-party computation with low depth circuits
Secure two-party computation is a rapidly emerging field of research and enables a large
variety of privacy-preserving applications such as mobile social networks or biometric …
variety of privacy-preserving applications such as mobile social networks or biometric …
Armadillo: a compilation chain for privacy preserving applications
In this work we present Armadillo a compilation chain used for compiling applications written
in a high-level language (C++) to work on encrypted data. The back-end of the compilation …
in a high-level language (C++) to work on encrypted data. The back-end of the compilation …
Secure query processing with data interoperability in a cloud database environment
WK Wong, B Kao, DWL Cheung, R Li… - Proceedings of the 2014 …, 2014 - dl.acm.org
We address security issues in a cloud database system which employs the DBaaS model. In
such a model, a data owner (DO) exports its data to a cloud database service provider (SP) …
such a model, a data owner (DO) exports its data to a cloud database service provider (SP) …
[PDF][PDF] SoK: Modular and efficient private decision tree evaluation
Decision trees and random forests are widely used classifiers in machine learning. Service
providers often host classification models in a cloud service and provide an interface for …
providers often host classification models in a cloud service and provide an interface for …
Rmind: a tool for cryptographically secure statistical analysis
Secure multi-party computation is a practical cryptographic method for processing
confidential data. Research progress has led to its use in privacy-preserving statistical …
confidential data. Research progress has led to its use in privacy-preserving statistical …
Fuse–flexible file format and intermediate representation for secure multi-party computation
Secure Multi-Party Computation (MPC) is continuously becoming more and more practical.
Many optimizations have been introduced, making MPC protocols more suitable for solving …
Many optimizations have been introduced, making MPC protocols more suitable for solving …
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies
We present privacy-preserving solutions for Genome-Wide Association Studies (GWAS)
based on Secure Multi-Party Computation (SMPC). Using SMPC, we protect the privacy of …
based on Secure Multi-Party Computation (SMPC). Using SMPC, we protect the privacy of …
Securing SQL based databases with cryptographic protocols
Y Lindell, G Pe'er, M Kraitsberg, V Osheter… - US Patent …, 2020 - Google Patents
The subject matter discloses a method operated on a com puterizing system comprising
generating two secret shares of at least some of the data fields in a database, loading data …
generating two secret shares of at least some of the data fields in a database, loading data …