Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
When federated learning meets privacy-preserving computation
Nowadays, with the development of artificial intelligence (AI), privacy issues attract wide
attention from society and individuals. It is desirable to make the data available but invisible …
attention from society and individuals. It is desirable to make the data available but invisible …
Evolutionary biogeography-based whale optimization methods with communication structure: Towards measuring the balance
J Tu, H Chen, J Liu, AA Heidari, X Zhang… - Knowledge-Based …, 2021 - Elsevier
Abstract Whale Optimization Algorithm (WOA) is a popular swarm-based algorithm with
some spotted defects in its generated patterns during the searching phases. In this study, an …
some spotted defects in its generated patterns during the searching phases. In this study, an …
An encrypted medical blockchain data search method with access control mechanism
The use of medical blockchain enables the safe sharing of electronic medical data (EMD).
With the continuous growth of EMD, how to efficiently find EMD on the medical blockchain is …
With the continuous growth of EMD, how to efficiently find EMD on the medical blockchain is …
Chaotic simulated annealing multi-verse optimization enhanced kernel extreme learning machine for medical diagnosis
J Liu, J Wei, AA Heidari, F Kuang, S Zhang… - Computers in Biology …, 2022 - Elsevier
Classification models such as Multi-Verse Optimization (MVO) play a vital role in disease
diagnosis. To improve the efficiency and accuracy of MVO, in this paper, the defects of MVO …
diagnosis. To improve the efficiency and accuracy of MVO, in this paper, the defects of MVO …
A novel hierarchical secret image sharing scheme with multi-group joint management
With the spread of the Internet, the speed of data spread is getting faster and faster. It
benefits us a lot but also brings us many potential security problems, especially the problem …
benefits us a lot but also brings us many potential security problems, especially the problem …
[HTML][HTML] Decentralized privacy-preserving data aggregation scheme for smart grid based on blockchain
As a next-generation power system, the smart grid can implement fine-grained smart
metering data collection to optimize energy utilization. Smart meters face serious security …
metering data collection to optimize energy utilization. Smart meters face serious security …
[HTML][HTML] RLL-SWE: A robust linked list steganography without embedding for intelligence networks in smart environments
With the rapid development of technology, smart environments utilizing the Internet of
Things, artificial intelligence, and big data are improving the quality of life and work …
Things, artificial intelligence, and big data are improving the quality of life and work …
Enhancing UAV-assisted vehicle edge computing networks through a digital twin-driven task offloading framework
Enhancing the task offload performance of UAV-assisted Vehicular Edge Computing
Networks (VECNs) is complex, especially in vehicle-to-everything (V2X) applications. These …
Networks (VECNs) is complex, especially in vehicle-to-everything (V2X) applications. These …
Instant_Anonymity: A lightweight semantic privacy guarantee for 5G-enabled IIoT
Data publication and sharing are critical components of assessing network infrastructures in
the Internet of Things for quality-of-service enhancement. Especially, the advancement in …
the Internet of Things for quality-of-service enhancement. Especially, the advancement in …
RPPTD: robust privacy-preserving truth discovery scheme
Benefitingfrom the rapid development of communication technology and Internet of Things
(IoT) devices, crowdsensing is on the rise. Sensor data from IoT devices can be requested …
(IoT) devices, crowdsensing is on the rise. Sensor data from IoT devices can be requested …