Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security, privacy, and robustness for trustworthy AI systems: A review
MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …
security privacy and robustness. The article delved into security measures both traditional …
Secure pharmaceutical supply chain using blockchain in IoT cloud systems
N Mangala, DR Naveen, BE Reddy, R Buyya… - Internet of Things, 2024 - Elsevier
Abstract Supply Chain Management (SCM) systems require time sequencing, coordination
and tracking the movement of goods and processes. Internet of Things (IoT) and Blockchain …
and tracking the movement of goods and processes. Internet of Things (IoT) and Blockchain …
“Will artificial intelligence platforms replace designers in the future?” analyzing the impact of artificial intelligence platforms on the engineering design industry through …
Y Li - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This research investigates the impact of artificial intelligence platforms on the engineering
design industry by analyzing the perceptions of color and views on artificial intelligence …
design industry by analyzing the perceptions of color and views on artificial intelligence …
The implementation of polynomial multiplication for lattice-based cryptography: A survey
The advent of quantum computing threatens the security of traditional public-key
cryptography. Algorithms for quantum computing have the ability to solve the large prime …
cryptography. Algorithms for quantum computing have the ability to solve the large prime …
Secure workflow scheduling algorithm utilizing hybrid optimization in mobile edge computing environments
DK Sajnani, X Li, AR Mahesar - Computer Communications, 2024 - Elsevier
The rapid advancement of mobile communication technology and devices has greatly
improved our way of life. It also presents a new possibility that data sources can be used to …
improved our way of life. It also presents a new possibility that data sources can be used to …
[HTML][HTML] Modeling and simulation of a double DQN algorithm for dynamic obstacle avoidance in autonomous vehicle navigation
Develo** an autonomous vehicle in safe navigated open environments through self-
learning is a formidable challenge. So, in this paper, an autonomous navigation …
learning is a formidable challenge. So, in this paper, an autonomous navigation …
Efficient multi-party Psi and its application in Port Management
M Qiao, L Wei, D Han, H Wu - Computer Standards & Interfaces, 2025 - Elsevier
Abstract Private Set Intersection (PSI) technology is a cryptographic tool that allows the
parties holding private data to determine the intersection of sets in a joint computation …
parties holding private data to determine the intersection of sets in a joint computation …
Privacy-preserving top-k spatio-temporal keyword preference query
X Zhao, J Yu - Computer Standards & Interfaces, 2025 - Elsevier
With the rapid advancement of location-based services and mobile devices, spatial keyword
query attracts increasing attention. In this paper, we focus on a new query type known as top …
query attracts increasing attention. In this paper, we focus on a new query type known as top …
Asynchronous verifiable information dispersal protocol of achieving optimal communication
Z Pang, L Shi, H **ang - Computer Networks, 2024 - Elsevier
The evolution of distributed systems necessitates robust protocols to facilitate secure and
efficient data storage and retrieval amid challenges like asynchronous communication and …
efficient data storage and retrieval amid challenges like asynchronous communication and …
LPHD: A low power and high diffusion lightweight block cipher
R Xu, L Li, X Huang - International Journal of Circuit Theory …, 2024 - Wiley Online Library
Smart door locks pose a large number of threats such as network attacks. Its storage area
and power of cipher are severely limited because the wireless nodes of smart door locks are …
and power of cipher are severely limited because the wireless nodes of smart door locks are …