Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
When machine learning meets privacy: A survey and outlook
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …
Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …
are adopting the cloud environment due to the least upfront capital investment, maximum …
Cheetah: Lean and fast secure {Two-Party} deep neural network inference
Secure two-party neural network inference (2PC-NN) can offer privacy protection for both the
client and the server and is a promising technique in the machine-learning-as-a-service …
client and the server and is a promising technique in the machine-learning-as-a-service …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
RETRACTED: SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising
P Manoharan, R Walia, C Iwendi, TA Ahanger… - Expert …, 2023 - Wiley Online Library
Abstract Machine learning are vulnerable to the threats. The Intruders can utilize the
malicious nature of the nodes to attack the training dataset to worsen the process and …
malicious nature of the nodes to attack the training dataset to worsen the process and …
A survey on cyber-security of connected and autonomous vehicles (CAVs)
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …
Toward trustworthy AI development: mechanisms for supporting verifiable claims
With the recent wave of progress in artificial intelligence (AI) has come a growing awareness
of the large-scale impacts of AI systems, and recognition that existing regulations and norms …
of the large-scale impacts of AI systems, and recognition that existing regulations and norms …
PoisonGAN: Generative poisoning attacks against federated learning in edge computing systems
Edge computing is a key-enabling technology that meets continuously increasing
requirements for the intelligent Internet-of-Things (IoT) applications. To cope with the …
requirements for the intelligent Internet-of-Things (IoT) applications. To cope with the …
{XONN}:{XNOR-based} oblivious deep neural network inference
Advancements in deep learning enable cloud servers to provide inference-as-a-service for
clients. In this scenario, clients send their raw data to the server to run the deep learning …
clients. In this scenario, clients send their raw data to the server to run the deep learning …
POSEIDON: Privacy-preserving federated neural network learning
In this paper, we address the problem of privacy-preserving training and evaluation of neural
networks in an $ N $-party, federated learning setting. We propose a novel system …
networks in an $ N $-party, federated learning setting. We propose a novel system …