Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data protection in AI services: A survey
Advances in artificial intelligence (AI) have shaped today's user services, enabling
enhanced personalization and better support. As such AI-based services inevitably require …
enhanced personalization and better support. As such AI-based services inevitably require …
Digital technologies and adherence in respiratory diseases: the road ahead
Outcomes for patients with chronic respiratory diseases remain poor despite the
development of novel therapies. In part, this reflects the fact that adherence to therapy is low …
development of novel therapies. In part, this reflects the fact that adherence to therapy is low …
IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge
IoT devices are notoriously vulnerable even to trivial attacks and can be easily
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …
Personal data stores (PDS): a review
KU Fallatah, M Barhamgi, C Perera - Sensors, 2023 - mdpi.com
Internet services have collected our personal data since their inception. In the beginning, the
personal data collection was uncoordinated and was limited to a few selected data types …
personal data collection was uncoordinated and was limited to a few selected data types …
[HTML][HTML] Avoiding the internet of insecure industrial things
Security incidents such as targeted distributed denial of service (DDoS) attacks on power
grids and hacking of factory industrial control systems (ICS) are on the increase. This paper …
grids and hacking of factory industrial control systems (ICS) are on the increase. This paper …
Building accountability into the Internet of Things: the IoT Databox model
This paper outlines the IoT Databox model as a means of making the Internet of Things (IoT)
accountable to individuals. Accountability is a key to building consumer trust and is …
accountable to individuals. Accountability is a key to building consumer trust and is …
What the fog? edge computing revisited: Promises, applications and future challenges
Edge computing brings computing and storage resources closer to (mobile) end users and
data sources, thus bypassing expensive and slow links to distant cloud computing …
data sources, thus bypassing expensive and slow links to distant cloud computing …
Flock: A Framework for Deploying {On-Demand} Distributed Trust
Recent years have exhibited an increase in applications that distribute trust across n servers
to protect user data from a central point of attack. However, these deployments remain …
to protect user data from a central point of attack. However, these deployments remain …
A survey on solutions to support developers in privacy-preserving IoT development
Abstract Internet-of-Things (IoT) devices are rising in popularity and their usefulness often
stems from the amount of data they collect. Data regulations such as the European General …
stems from the amount of data they collect. Data regulations such as the European General …
Rationalizing dark patterns: Examining the process of designing privacy UX through speculative enactments
LGM Nelissen, M Funk - International journal of design, 2022 - research.tue.nl
Connected products and applications increasingly leverage users' personal data in their
core functions. Designing privacy-sensitive interfaces for such data-related applications is a …
core functions. Designing privacy-sensitive interfaces for such data-related applications is a …