Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A survey: Security, transparency, and scalability issues of nft's and its marketplaces
S Bhujel, Y Rahulamathavan - Sensors, 2022 - mdpi.com
Non-fungible Tokens (NFTs) are ownership records stored on a blockchain, and they are
typically digital items such as photos and videos. In many ways, an NFT is like a …
typically digital items such as photos and videos. In many ways, an NFT is like a …
A comprehensive review of the security flaws of hashing algorithms
The blockchain is an emerging technology. It is widely used because of its efficiency and
functionality. The hash function, as a supporting aspect of the data structure, is critical for …
functionality. The hash function, as a supporting aspect of the data structure, is critical for …
[HTML][HTML] Financial portfolio optimization with online deep reinforcement learning and restricted stacked autoencoder—DeepBreath
The process of continuously reallocating funds into financial assets, aiming to increase the
expected return of investment and minimizing the risk, is known as portfolio management. In …
expected return of investment and minimizing the risk, is known as portfolio management. In …
[HTML][HTML] A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …
one of the most interesting technologies of the last decade. It is a new paradigm able to …
Monitoring and controlling engineering projects with blockchain-based critical chain project management
Projects in the AEC industry often experience significant schedule delays due to complexity,
inadequate planning, design inconsistencies, resource unavailability, poor resource …
inadequate planning, design inconsistencies, resource unavailability, poor resource …
Research on the criteria of cryptographic resistant of continuous encryption algorithms
D Akbarov, S Umarov, M Turdimatov… - E3S Web of …, 2024 - e3s-conferences.org
The article examines the features of the criteria for the strength of continuous encryption
algorithms. The general properties of the models of algorithms of the continuous encryption …
algorithms. The general properties of the models of algorithms of the continuous encryption …
Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges
This paper presents a survey of non‐fungible tokens (NFTs), including its history,
technologies, standards, and challenges in their development. An NFT is a unique digital …
technologies, standards, and challenges in their development. An NFT is a unique digital …
Blockchain technology and IoT-edge framework for sharing healthcare services
Abstract Internet of Things (IoT) can be used in the healthcare sector to exchange patients'
information, but there are many concerns about the privacy and security of the patients' …
information, but there are many concerns about the privacy and security of the patients' …
Constructing chaos-based hash function via parallel impulse perturbation
H Liu, X Wang, A Kadir - Soft Computing, 2021 - Springer
Secure hash functions, such as SHA-2 and SHA-3, play an important role in cryptography;
however, they are unkeyed and cannot produce the specific hash value with a specified …
however, they are unkeyed and cannot produce the specific hash value with a specified …
Pfdup: Practical fuzzy deduplication for encrypted multimedia data
S Cheng, Z Tang, S Zeng, X Cui, T Li - Journal of Industrial Information …, 2024 - Elsevier
Redundant data wastes cloud storage space, especially the multimedia data which
comprises a large number of similar files and accounts for the majority of cloud storage. To …
comprises a large number of similar files and accounts for the majority of cloud storage. To …