Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure routing strategy based on attribute-based trust access control in social-aware networks
In social aware networks, the routing protocol possesses a considerable amount of sensitive
user information during node transmission. When selecting the next hop node for …
user information during node transmission. When selecting the next hop node for …
A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance
The remarkable increasing demands of mitigating losses from cyber incidents for financial
firms has been driving the rapid development of the Cybersecurity Insurance (CI). The …
firms has been driving the rapid development of the Cybersecurity Insurance (CI). The …
EALLR: Energy-aware low-latency routing data driven model in mobile edge computing
X Zhang, D Hou, Z **ong, Y Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid development of the Mobile Edge Computing (MEC) and the Internet of Things
(IoT), intelligent interconnectivity and data exchange between devices have become …
(IoT), intelligent interconnectivity and data exchange between devices have become …
Big data dimension reduction using PCA
Principal component analysis (PCA) is a powerfultool in dimensional reduction for highly
correlated data. ClassicalPCA approaches cannot be applied to big data because ofmemory …
correlated data. ClassicalPCA approaches cannot be applied to big data because ofmemory …
Advances in molecular modeling of nanoparticle–nucleic acid interfaces
Nanoparticles (NPs) play increasingly important roles in nanotechnology and nanomedicine
in which nanoparticle surface chemistry allows for control over interactions with other …
in which nanoparticle surface chemistry allows for control over interactions with other …
Secure neural network in federated learning with model aggregation under multiple keys
ZL Jiang, H Guo, Y Pan, Y Liu, X Wang… - 2021 8th IEEE …, 2021 - ieeexplore.ieee.org
Federated learning is a privacy preserving machine learning paradigm which trains model
on distributed datasets. Homomorphic encryption can be used to protect local model …
on distributed datasets. Homomorphic encryption can be used to protect local model …
Research and implementation of SVD in machine learning
Y Wang, L Zhu - 2017 IEEE/ACIS 16th International Conference …, 2017 - ieeexplore.ieee.org
With the arrival of the era of big data, people's ability to collect and obtain data is becoming
more powerful. These data have shown the characteristics of high dimension, large scale …
more powerful. These data have shown the characteristics of high dimension, large scale …
Homomorphic encryption scheme based on elliptic curve cryptography for privacy protection of cloud computing
M Hong, PY Wang, WB Zhao - … on Big Data Security on Cloud …, 2016 - ieeexplore.ieee.org
Cloud computing is becoming the main computing model in the future due to its advantages
such as high resource utilization rate and save high cost of performance. The public …
such as high resource utilization rate and save high cost of performance. The public …
A safety vehicle detection mechanism based on YOLOv5
Y Huang, H Zhang - 2021 IEEE 6th international conference on …, 2021 - ieeexplore.ieee.org
Vehicle affect the safety of people's daily life, and it is difficult to detect and discriminate the
surrounding conditions of the vehicle because of a variety of object types and different sizes …
surrounding conditions of the vehicle because of a variety of object types and different sizes …
Wood–moisture relationships studied with molecular simulations: methodological guidelines
This paper aims at providing a methodological framework for investigating wood polymers
using atomistic modeling, namely, molecular dynamics (MD) and grand canonical Monte …
using atomistic modeling, namely, molecular dynamics (MD) and grand canonical Monte …