Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Differential privacy for deep and federated learning: A survey
Users' privacy is vulnerable at all stages of the deep learning process. Sensitive information
of users may be disclosed during data collection, during training, or even after releasing the …
of users may be disclosed during data collection, during training, or even after releasing the …
Anonymization techniques for privacy preserving data publishing: A comprehensive survey
A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …
owners such as hospitals, banks, social network (SN) service providers, and insurance …
Privacy and security concerns in the smart city
BFG Fabrègue, A Bogoni - Smart Cities, 2023 - mdpi.com
This article will highlight negative personal privacy and informational security outcomes that
may arise from development programs currently pursued in smart cities. It aims to illustrate …
may arise from development programs currently pursued in smart cities. It aims to illustrate …
On mobile edge caching
With the widespread adoption of various mobile applications, the amount of traffic in wireless
networks is growing at an exponential rate, which exerts a great burden on mobile core …
networks is growing at an exponential rate, which exerts a great burden on mobile core …
Differential privacy for industrial internet of things: Opportunities, applications, and challenges
The development of Internet of Things (IoT) brings new changes to various fields.
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …
Graph theory: A comprehensive survey about graph theory applications in computer science and social networks
A Majeed, I Rauf - Inventions, 2020 - mdpi.com
Graph theory (GT) concepts are potentially applicable in the field of computer science (CS)
for many purposes. The unique applications of GT in the CS field such as clustering of web …
for many purposes. The unique applications of GT in the CS field such as clustering of web …
Applications of differential privacy in social network analysis: A survey
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …
As social network analysis has been enjoying many applications, it opens a new arena for …
[HTML][HTML] The application of blockchain in social media: a systematic literature review
MA Hisseine, D Chen, X Yang - Applied Sciences, 2022 - mdpi.com
Social media has transformed the mode of communication globally by providing an
extensive system for exchanging ideas, initiating business contracts, and proposing new …
extensive system for exchanging ideas, initiating business contracts, and proposing new …
A survey on privacy in social media: Identification, mitigation, and applications
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …
participate in numerous activities on a daily basis. This results in tremendous amounts of …
[HTML][HTML] Context-aware recommender system: A review of recent developmental process and future research direction
Intelligent data handling techniques are beneficial for users; to store, process, analyze and
access the vast amount of information produced by electronic and automated devices. The …
access the vast amount of information produced by electronic and automated devices. The …