Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Using text mining to establish knowledge graph from accident/incident reports in risk assessment
C Liu, S Yang - Expert Systems with Applications, 2022 - Elsevier
To clarify the risk factors and propagation characteristics affecting railway safety, we learn
from historical reports to build a connected network of hazards and accidents, forming a …
from historical reports to build a connected network of hazards and accidents, forming a …
[HTML][HTML] A comprehensive analysis of privacy-preserving solutions developed for online social networks
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …
tools, the use of various online social networks (OSNs) has significantly increased. On the …
A novel approach to create synthetic biomedical signals using BiRNN
Human health is threatened by several diseases for this reason automated medical
diagnosis systems has been developed several years ago. These systems need databases …
diagnosis systems has been developed several years ago. These systems need databases …
A user sensitive subject protection approach for book search service
Z Wu, R Li, Z Zhou, J Guo, J Jiang… - Journal of the Association …, 2020 - Wiley Online Library
In a digital library, book search is one of the most important information services. However,
with the rapid development of network technologies such as cloud computing, the server …
with the rapid development of network technologies such as cloud computing, the server …
Fractal intelligent privacy protection in online social network using attribute-based encryption schemes
While the online social network (OSN) has brought much convenience to users, there are
still some serious problems, such as personal privacy leaks. Today, OSN security and …
still some serious problems, such as personal privacy leaks. Today, OSN security and …
PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks
Online social networks (OSNs) have become popular around the world due to its openness.
Although cryptographic techniques can provide privacy protection for users in OSNs, several …
Although cryptographic techniques can provide privacy protection for users in OSNs, several …
A sanitization approach for privacy preserving data mining on social distributed environment
Data owners worry about their private data in the information that is being uncovered without
authorization in the cloud computing environment. While applying privacy preserving …
authorization in the cloud computing environment. While applying privacy preserving …
Sanitizing and measuring privacy of large sparse datasets for recommender systems
Big Data is characterized by large volumes of highly dynamical data and is used for
discovering hidden trends and correlations. However, as more data is collected, previous …
discovering hidden trends and correlations. However, as more data is collected, previous …
A synthetic data generator for online social network graphs
Two of the difficulties for data analysts of online social networks are (1) the public availability
of data and (2) respecting the privacy of the users. One possible solution to both of these …
of data and (2) respecting the privacy of the users. One possible solution to both of these …
Scalable non-deterministic clustering-based k-anonymization for rich networks
In this paper, we tackle the problem of graph anonymization in the context of privacy-
preserving social network mining. We present a greedy and non-deterministic algorithm to …
preserving social network mining. We present a greedy and non-deterministic algorithm to …