Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of the fusion of traditional data security technology and blockchain
Blockchain is a new distributed infrastructure and computing paradigm, which has been
widely used in various fields. For example, utilizing a chain data structure to verify and …
widely used in various fields. For example, utilizing a chain data structure to verify and …
Vulnerability assessment and management planning for the ecological environment in urban wetlands
X Yang, S Liu, C Jia, Y Liu, C Yu - Journal of Environmental Management, 2021 - Elsevier
As a special ecosystem in cities, urban wetland parks have important environmental
regulation and social service functions. This paper proposes a new methodology of urban …
regulation and social service functions. This paper proposes a new methodology of urban …
[LLIBRE][B] A Guide to Data Privacy
V Torra - 2022 - Springer
Data privacy is now a hot topic. Big data have increased its importance. Nevertheless,
computational methods for data privacy have been studied and developed since the 70s, at …
computational methods for data privacy have been studied and developed since the 70s, at …
Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis
Abstract k-Anonymous microaggregation is a widespread technique to address the problem
of protecting the privacy of the respondents involved beyond the mere suppression of their …
of protecting the privacy of the respondents involved beyond the mere suppression of their …
The fast maximum distance to average vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data
A Rodríguez-Hoyos, J Estrada-Jiménez… - … Applications of Artificial …, 2020 - Elsevier
The massive exploitation of tons of data is currently guiding critical decisions in domains
such as economics or health. But serious privacy risks arise since personal data is …
such as economics or health. But serious privacy risks arise since personal data is …
Reconciling privacy and efficient utility management in smart cities
D Rebollo‐Monedero, A Bartoli… - Transactions on …, 2014 - Wiley Online Library
ABSTRACT A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient
management of utilities, enabled by technologies such as those entailing smart metering of …
management of utilities, enabled by technologies such as those entailing smart metering of …
p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation
We develop a probabilistic variant of k-anonymous microaggregation which we term p-
probabilistic resorting to a statistical model of respondent participation in order to aggregate …
probabilistic resorting to a statistical model of respondent participation in order to aggregate …
DocCloud: A document recommender system on cloud computing with plausible deniability
Recommender systems select the most interesting products for costumers based on their
interests. The move of a recommender system to a cloud faces many challenges from the …
interests. The move of a recommender system to a cloud faces many challenges from the …
k-Anonymous microaggregation with preservation of statistical dependence
Abstract k-Anonymous microaggregation emerges as an essential building block in
statistical disclosure control a field concerning the postprocessing of the demographic …
statistical disclosure control a field concerning the postprocessing of the demographic …
Rounding based continuous data discretization for statistical disclosure control
Abstract “Rounding” can be understood as a way to coarsen continuous data. That is, low
level and infrequent values are replaced by high-level and more frequent representative …
level and infrequent values are replaced by high-level and more frequent representative …