Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Federated learning in smart cities: Privacy and security survey
Over the last decade, smart cities (SC) have been developed worldwide. Implementing big
data and the internet of things improves the monitoring and integration of different …
data and the internet of things improves the monitoring and integration of different …
Anonymization techniques for privacy preserving data publishing: A comprehensive survey
A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …
owners such as hospitals, banks, social network (SN) service providers, and insurance …
A deep learning-based fast fake news detection model for cyber-physical social services
With the prevalence of social network service in cyber-Physical space, flow of various fake
news has been a rough issue for operators of social service. Although many theoretical …
news has been a rough issue for operators of social service. Although many theoretical …
Clustered federated learning with adaptive local differential privacy on heterogeneous iot data
The Internet of Things (IoT) is penetrating many aspects of our daily life with the proliferation
of artificial intelligence applications. Federated learning (FL) has emerged as a promising …
of artificial intelligence applications. Federated learning (FL) has emerged as a promising …
Privacy-preserved data sharing towards multiple parties in industrial IoTs
The effective physical data sharing has been facilitating the functionality of Industrial IoTs,
which is believed to be one primary basis for Industry 4.0. These physical data, while …
which is believed to be one primary basis for Industry 4.0. These physical data, while …
Progress in outlier detection techniques: A survey
Detecting outliers is a significant problem that has been studied in various research and
application areas. Researchers continue to design robust schemes to provide solutions to …
application areas. Researchers continue to design robust schemes to provide solutions to …
A low-latency edge computation offloading scheme for trust evaluation in finance-level artificial intelligence of things
The finance-level Artificial Intelligence of Things (AIoT) is going to become a novel media in
the 6G-driven digital society. Inside the financial AIoT environment, large-scale crowd credit …
the 6G-driven digital society. Inside the financial AIoT environment, large-scale crowd credit …
A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to
enable computing services devices deployed at network edge, aiming to improve the user's …
enable computing services devices deployed at network edge, aiming to improve the user's …
Robust collaborative filtering recommendation with user-item-trust records
The ever-increasing popularity of recommendation systems allows users to find appropriate
services without excessive effort. However, due to the unstable and complex network …
services without excessive effort. However, due to the unstable and complex network …
Social engineering attacks prevention: A systematic literature review
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …
Social engineering attacks occur when victims do not recognize methods, models, and …