Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning for synthetic data generation: a review
Machine learning heavily relies on data, but real-world applications often encounter various
data-related issues. These include data of poor quality, insufficient data points leading to …
data-related issues. These include data of poor quality, insufficient data points leading to …
Differential privacy for deep and federated learning: A survey
A El Ouadrhiri, A Abdelhadi - IEEE access, 2022 - ieeexplore.ieee.org
Users' privacy is vulnerable at all stages of the deep learning process. Sensitive information
of users may be disclosed during data collection, during training, or even after releasing the …
of users may be disclosed during data collection, during training, or even after releasing the …
Location privacy-preserving mechanisms in location-based services: A comprehensive survey
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
Differential privacy techniques for cyber physical systems: A survey
MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …
development of information and communication technologies (ICT). With the provision of …
Vector-indistinguishability: location dependency based privacy protection for successive location data
With the wide use of GPS enabled devices and Location-Based Services, location privacy
has become an increasingly worrying challenge to our community. Existing approaches …
has become an increasingly worrying challenge to our community. Existing approaches …
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
Applications of differential privacy in social network analysis: A survey
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …
As social network analysis has been enjoying many applications, it opens a new arena for …
Synthesizing plausible privacy-preserving location traces
V Bindschaedler, R Shokri - 2016 IEEE symposium on security …, 2016 - ieeexplore.ieee.org
Camouflaging user's actual location with fakes is a prevalent obfuscation technique for
protecting location privacy. We show that the protection mechanisms based on the existing …
protecting location privacy. We show that the protection mechanisms based on the existing …
DPT: differentially private trajectory synthesis using hierarchical reference systems
GPS-enabled devices are now ubiquitous, from airplanes and cars to smartphones and
wearable technology. This has resulted in a wealth of data about the movements of …
wearable technology. This has resulted in a wealth of data about the movements of …
Sok: Privacy-preserving data synthesis
As the prevalence of data analysis grows, safeguarding data privacy has become a
paramount concern. Consequently, there has been an upsurge in the development of …
paramount concern. Consequently, there has been an upsurge in the development of …