Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Intel software guard extensions applications: A survey
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Ai-based mobile edge computing for iot: Applications, challenges, and future scope
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …
DQN-based mobile edge computing for smart Internet of vehicle
L Zhang, W Zhou, J **a, C Gao, F Zhu, C Fan… - EURASIP journal on …, 2022 - Springer
In this paper, we investigate a multiuser mobile edge computing (MEC)-aided smart Internet
of vehicle (IoV) network, where one edge server can help accomplish the intensive …
of vehicle (IoV) network, where one edge server can help accomplish the intensive …
Human‐centered attention‐aware networks for action recognition
S Liu, Y Li, W Fu - International Journal of Intelligent Systems, 2022 - Wiley Online Library
Action recognition in video is a research hot spot in the field of computer vision. Learning
important clues in video context has significant effect to promote the interaction prediction …
important clues in video context has significant effect to promote the interaction prediction …
Federated learning‐based trajectory prediction model with privacy preserving for intelligent vehicle
M Han, K Xu, S Ma, A Li, H Jiang - International journal of …, 2022 - Wiley Online Library
The existing trajectory prediction is mainly for specific road sections, which is poor to adapt
to complex and changing traffic scenarios. Meanwhile, decentralized trajectory data is hard …
to complex and changing traffic scenarios. Meanwhile, decentralized trajectory data is hard …
Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U‐net based on multiple spaces
Y Wei, J Ma, Z Wang, B **ao… - International Journal of …, 2022 - Wiley Online Library
With the popularity of image editing tools, the originality and information security of images
are facing serious threats. The most common threat is splicing forgery that copies a part of …
are facing serious threats. The most common threat is splicing forgery that copies a part of …
Security of federated learning for cloud‐edge intelligence collaborative computing
J Yang, J Zheng, Z Zhang, QI Chen… - … Journal of Intelligent …, 2022 - Wiley Online Library
Federated Learning (FL) is one of the key technologies to solve privacy protection for cloud‐
edge intelligent collaborative computing, and its security and privacy issues have attracted …
edge intelligent collaborative computing, and its security and privacy issues have attracted …
Similarity-based integrity protection for deep learning systems
Deep learning technologies have achieved remarkable success in various tasks, ranging
from computer vision, object detection to natural language processing. Unfortunately, state …
from computer vision, object detection to natural language processing. Unfortunately, state …
Privacy preserving federated learning for full heterogeneity
K Chen, X Zhang, X Zhou, B Mi, Y **ao, L Zhou, Z Wu… - ISA transactions, 2023 - Elsevier
Federated learning is a novel distribute machine learning paradigm to support cooperative
model training among multiple participant clients, where each client keeps its private data …
model training among multiple participant clients, where each client keeps its private data …
A federated semi‐supervised learning approach for network traffic classification
Z **, Z Liang, M He, Y Peng, H Xue… - International Journal of …, 2023 - Wiley Online Library
The classification of network traffic, which involves classifying and identifying the type of
network traffic, is the most fundamental step to network service improvement and modern …
network traffic, is the most fundamental step to network service improvement and modern …