Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects
S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …
numerous applications in our surrounding environment. The fundamental goal of an IoT …
[HTML][HTML] Evaluating privacy, security, and trust perceptions in conversational AI: A systematic review
Conversational AI (CAI) systems which encompass voice-and text-based assistants are on
the rise and have been largely integrated into people's everyday lives. Despite their …
the rise and have been largely integrated into people's everyday lives. Despite their …
" I Deleted It After the Overturn of Roe v. Wade": Understanding Women's Privacy Concerns Toward Period-Tracking Apps in the Post Roe v. Wade Era
The overturn of Roe v. Wade has taken away the constitutional right to abortion. Prior work
shows that period-tracking apps' data practices can be used to detect pregnancy and …
shows that period-tracking apps' data practices can be used to detect pregnancy and …
Understanding dark patterns in home IoT devices
Internet-of-Things (IoT) devices are ubiquitous, but little attention has been paid to how they
may incorporate dark patterns despite consumer protections and privacy concerns arising …
may incorporate dark patterns despite consumer protections and privacy concerns arising …
Exploring deceptive design patterns in voice interfaces
Deceptive design patterns (sometimes called “dark patterns”) are user interface design
elements that may trick, deceive, or mislead users into behaviors that often benefit the party …
elements that may trick, deceive, or mislead users into behaviors that often benefit the party …
Kee** privacy labels honest
At the end of 2020, Apple introduced privacy nutritional labels, requiring app developers to
state what data is collected by their apps and for what purpose. In this paper, we take an in …
state what data is collected by their apps and for what purpose. In this paper, we take an in …
Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …
steadily growing. They suffer from vulnerabilities just as other software and hardware …
An informative security and privacy “nutrition” label for internet of things devices
Consumers are concerned about the security and privacy of their Internet of Things (IoT)
devices. However, they cannot easily learn about their devices' security protections and data …
devices. However, they cannot easily learn about their devices' security protections and data …
[HTML][HTML] Unpacking privacy labels: A measurement and developer perspective on google's data safety section
Secure Collaborative Machine Learning (SCML) suffers from high communication cost
caused by secure computation protocols. While modern datacenters offer high-bandwidth …
caused by secure computation protocols. While modern datacenters offer high-bandwidth …
Are Consumers Willing to Pay for Security and Privacy of {IoT} Devices?
Internet of Things (IoT) device manufacturers provide little information to consumers about
their security and data handling practices. Therefore, IoT consumers cannot make informed …
their security and data handling practices. Therefore, IoT consumers cannot make informed …