Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of compiler testing
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
The security in optical wireless communication: A survey
With the demand for economical and high-speed wireless services, Optical Wireless
Communication (OWC) has attracted increasing attention in both research and the market. In …
Communication (OWC) has attracted increasing attention in both research and the market. In …
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …
some form of smart device in their homes or workplaces. These devices are often off-the …
A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
Penetration vision through virtual reality headsets: identifying 360-degree videos from head movements
In this paper, we present the first contactless side-channel attack for identifying 360 videos
being viewed in a Virtual Reality (VR) Head Mounted Display (HMD). Although the video …
being viewed in a Virtual Reality (VR) Head Mounted Display (HMD). Although the video …
Smart homes app vulnerabilities, threats, and solutions: A systematic literature review
The smart home is one of the most significant applications of Internet of Things (IoT). Smart
home is basically the combination of different components like devices, hub, cloud, and …
home is basically the combination of different components like devices, hub, cloud, and …
Zoom on the keystrokes: Exploiting video calls for keystroke inference attacks
Due to recent world events, video calls have become the new norm for both personal and
professional remote communication. However, if a participant in a video call is not careful …
professional remote communication. However, if a participant in a video call is not careful …
Sniffing visible light communication through walls
Visible light communication (VLC) is gaining a significant amount of interest as a new
paradigm to meet rapidly increasing demands on wireless capacity required by a digitalized …
paradigm to meet rapidly increasing demands on wireless capacity required by a digitalized …
Enabling security services in socially assistive robot scenarios for healthcare applications
Today's IoT deployments are highly complex, heterogeneous and constantly changing. This
poses severe security challenges such as limited end-to-end security support, lack of cross …
poses severe security challenges such as limited end-to-end security support, lack of cross …