Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Anonymization techniques for privacy preserving data publishing: A comprehensive survey
A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …
owners such as hospitals, banks, social network (SN) service providers, and insurance …
Privacy-preserving big data analytics a comprehensive survey
HY Tran, J Hu - Journal of Parallel and Distributed Computing, 2019 - Elsevier
In this paper, we present a comprehensive survey of privacy-preserving big data analytics.
We introduce well-designed taxonomies which offer both systematic views and a detailed …
We introduce well-designed taxonomies which offer both systematic views and a detailed …
Dynamic resource allocation for load balancing in fog environment
Fog computing is emerging as a powerful and popular computing paradigm to perform IoT
(Internet of Things) applications, which is an extension to the cloud computing paradigm to …
(Internet of Things) applications, which is an extension to the cloud computing paradigm to …
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment
With the increasing popularity of service computing paradigm, tremendous resources or
services are emerging rapidly on the Web, imposing heavy burdens on the service selection …
services are emerging rapidly on the Web, imposing heavy burdens on the service selection …
Time-aware distributed service recommendation with privacy-preservation
As a promising way to extract insightful information from massive data, service
recommendation has gained ever-increasing attentions in both academic and industrial …
recommendation has gained ever-increasing attentions in both academic and industrial …
A survey of hardware Trojan threat and defense
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …
various means to steal the internal sensitive data or modify original functionality, which may …
LGIEM: Global and local node influence based community detection
Community detection is one of the hot topics in the complex networks. It aims to find
subgraphs that are internally dense but externally sparsely connected. In this paper, a new …
subgraphs that are internally dense but externally sparsely connected. In this paper, a new …
Privacy preserving E-voting cloud system based on ID based encryption
Most of the various sectors in today's life such as bank, transport, voting, health, electricity,
etc., are currently digitalized. In our research paper, we have surveyed the voting system …
etc., are currently digitalized. In our research paper, we have surveyed the voting system …
Privacy-preserving quality prediction for edge-based IoT services
Abstract Quality of Service (QoS) prediction and privacy preservation are two key challenges
in service recommendation. Nevertheless, the existing QoS prediction methods cannot be …
in service recommendation. Nevertheless, the existing QoS prediction methods cannot be …
A survey of graph-modification techniques for privacy-preserving on networks
Recently, a huge amount of social networks have been made publicly available. In parallel,
several definitions and methods have been proposed to protect users' privacy when publicly …
several definitions and methods have been proposed to protect users' privacy when publicly …