Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
A survey on mobile social networks: Applications, platforms, system architectures, and future research directions
Mobile social networks (MSNs) have become increasingly popular in supporting many novel
applications since emerging in the recent years. Their applications and services are of great …
applications since emerging in the recent years. Their applications and services are of great …
Panda: Public auditing for shared data with efficient user revocation in the cloud
With data storage and sharing services in the cloud, users can easily modify and share data
as a group. To ensure shared data integrity can be verified publicly, users in the group need …
as a group. To ensure shared data integrity can be verified publicly, users in the group need …
An efficient privacy-preserving outsourced calculation toolkit with multiple keys
In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation
under multiple encrypted keys (EPOM). Using EPOM, a large scale of users can securely …
under multiple encrypted keys (EPOM). Using EPOM, a large scale of users can securely …
Authorized private keyword search over encrypted data in cloud computing
In cloud computing, clients usually outsource their data to the cloud storage servers to
reduce the management costs. While those data may contain sensitive personal information …
reduce the management costs. While those data may contain sensitive personal information …
Towards a visual privacy advisor: Understanding and predicting privacy risks in images
With an increasing number of users sharing information online, privacy implications entailing
such actions are a major concern. For explicit content, such as user profile or GPS data …
such actions are a major concern. For explicit content, such as user profile or GPS data …
SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency
With the pervasiveness of smart phones and the advance of wireless body sensor networks
(BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare …
(BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare …
Exploiting social ties for cooperative D2D communications: A mobile social networking case
Thanks to the convergence of pervasive mobile communications and fast-growing online
social networking, mobile social networking is penetrating into our everyday life. Aiming to …
social networking, mobile social networking is penetrating into our everyday life. Aiming to …
Fast and private computation of cardinality of set intersection and union
In many everyday scenarios, sensitive information must be shared between parties without
complete mutual trust. Private set operations are particularly useful to enable sharing …
complete mutual trust. Private set operations are particularly useful to enable sharing …
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse
Intelligent identification of close friends is the mainstream approach to protect users' multi-
dimensional data in the social metaverse. It provides a fine-grained matching service for …
dimensional data in the social metaverse. It provides a fine-grained matching service for …