Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Providing source location privacy in wireless sensor networks: A survey
M Conti, J Willemsen, B Crispo - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect,
and disseminate information for many different types of applications. One of these …
and disseminate information for many different types of applications. One of these …
Evolving privacy: From sensors to the Internet of Things
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …
interacting things capable of offering all sorts of services to near and remote entities. The …
Privacy preservation in wireless sensor networks: A state-of-the-art survey
Much of the existing work on wireless sensor networks (WSNs) has focused on addressing
the power and computational resource constraints of WSNs by the design of specific routing …
the power and computational resource constraints of WSNs by the design of specific routing …
Towards statistically strong source anonymity for sensor networks
For sensor networks deployed to monitor and report real events, event source anonymity is
an attractive and critical security property, which unfortunately is also very difficult and …
an attractive and critical security property, which unfortunately is also very difficult and …
A survey on security requirements for WSNs: focusing on the characteristics related to security
As WSNs combine with a diversity of next-generation technologies, wireless sensor
networks (WSNs) have gained considerable attention as a promising ubiquitous technology …
networks (WSNs) have gained considerable attention as a promising ubiquitous technology …
Privacy-aware mobile services over road networks
Consider a mobile client who travels over roads and wishes to receive location-based
services (LBS) from untrusted service providers. How might the user obtain such services …
services (LBS) from untrusted service providers. How might the user obtain such services …
Security and privacy considerations for wireless sensor networks in smart home environments
Wireless Sensor Network (WSN) has emerged as a dependable technology to improve the
quality of life in smart homes through offering various automated, interactive and comfortable …
quality of life in smart homes through offering various automated, interactive and comfortable …
Prediction privacy in distributed multi-exit neural networks: Vulnerabilities and solutions
Distributed Multi-exit Neural Networks (MeNNs) use partitioning and early exits to reduce the
cost of neural network inference on low-power sensing systems. Existing MeNNs exhibit …
cost of neural network inference on low-power sensing systems. Existing MeNNs exhibit …
Analysis of security threats and vulnerability for cyber-physical systems
Governments, enterprises and research institutions have participated the research and
development of cyber-physical systems (CPS). However, the development of cyber-physical …
development of cyber-physical systems (CPS). However, the development of cyber-physical …
A survey on privacy preservation in fog-enabled internet of things
Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical
challenges that need to be addressed before the full adoption of the IoT. Data privacy is one …
challenges that need to be addressed before the full adoption of the IoT. Data privacy is one …