Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
Homomorphic encryption for machine learning in medicine and bioinformatics
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Sok: General purpose compilers for secure multi-party computation
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …
compute a joint function on their inputs without revealing any information beyond the result …
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
HE3DB: An efficient and elastic encrypted database via arithmetic-and-logic fully homomorphic encryption
As concerns are increasingly raised about data privacy, encrypted database management
system (DBMS) based on fully homomorphic encryption (FHE) attracts increasing research …
system (DBMS) based on fully homomorphic encryption (FHE) attracts increasing research …
Secure and efficient outsourcing of PCA-based face recognition
Face recognition has become increasingly popular in recent years. However, in some
special cases, many face recognition calculations cannot be performed effectively due to the …
special cases, many face recognition calculations cannot be performed effectively due to the …
OBFP: Optimized blockchain-based fair payment for outsourcing computations in cloud computing
Outsourcing computations have been widely used to meet the growing computing demands,
although achieving trust in an untrusted (or a zero-trust) environment can be challenging in …
although achieving trust in an untrusted (or a zero-trust) environment can be challenging in …
Enhancing trust and privacy in distributed networks: a comprehensive survey on blockchain-based federated learning
J Liu, C Chen, Y Li, L Sun, Y Song, J Zhou… - … and Information Systems, 2024 - Springer
While centralized servers pose a risk of being a single point of failure, decentralized
approaches like blockchain offer a compelling solution by implementing a consensus …
approaches like blockchain offer a compelling solution by implementing a consensus …
SOCI: A toolkit for secure outsourced computation on integers
Secure outsourced computation is a key technique for protecting data security and privacy in
the cloud. Although fully homomorphic encryption (FHE) enables computations over …
the cloud. Although fully homomorphic encryption (FHE) enables computations over …