Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda
Since the popularisation of the Internet in the 1990s, the cyberspace has kept evolving. We
have created various computer-mediated virtual environments, including social networks …
have created various computer-mediated virtual environments, including social networks …
AirGapAgent: Protecting privacy-conscious conversational agents
The growing use of large language model (LLM)-based conversational agents to manage
sensitive user data raises significant privacy concerns. While these agents excel at …
sensitive user data raises significant privacy concerns. While these agents excel at …
Marketing in the metaverse: A sceptical viewpoint of opportunities and future research directions
K Israfılzade - The Eurasia Proceedings of Educational and Social …, 2022 - dergipark.org.tr
Metaverse can be a difficult concept to comprehend because of its nature which includes
richness and complexity. Researchers, managers, and opinion leaders anticipate that the …
richness and complexity. Researchers, managers, and opinion leaders anticipate that the …
Honeysuckle: Annotation-guided code generation of in-app privacy notices
In-app privacy notices can help smartphone users make informed privacy decisions.
However, they are rarely used in real-world apps, since developers often lack the …
However, they are rarely used in real-world apps, since developers often lack the …
DIPA2: An Image Dataset with Cross-cultural Privacy Perception Annotations
The world today is increasingly visual. Many of the most popular online social networking
services are largely powered by images, making image privacy protection a critical research …
services are largely powered by images, making image privacy protection a critical research …
PARROT: Interactive privacy-aware internet of things application design tool
N Alhirabi, S Beaumont, JT Llanos… - Proceedings of the …, 2023 - dl.acm.org
Internet of Things (IoT) applications typically collect and analyse personal data that is
categorised as sensitive or special category of personal data. These data are subject to a …
categorised as sensitive or special category of personal data. These data are subject to a …
Assessing the relationship between mobile devices usage, self-efficacy and online information seeking behavior: a demographic analysis in academic rural context
Purpose In recent years, the use of mobile devices for academic persistence has grown to
be an indispensable element of students' learning, highlighting the broad acceptance and …
be an indispensable element of students' learning, highlighting the broad acceptance and …
Theophany: Multimodal speech augmentation in instantaneous privacy channels
Many factors affect speech intelligibility in face-to-face conversations. These factors lead
conversation participants to speak louder and more distinctively, exposing the content to …
conversation participants to speak louder and more distinctively, exposing the content to …
Evaluating the Privacy Valuation of Personal Data on Smartphones
Smartphones hold a great variety of personal data during usage, which at the same time
poses privacy risks. In this paper, we used the selling price to reflect users' privacy valuation …
poses privacy risks. In this paper, we used the selling price to reflect users' privacy valuation …
Implementing GDPR for mobile and ubiquitous computing
The General Data Protection Regulation (GDPR) presents directives to give data subjects
control over their personal data. These directives impose data-collecting and processing …
control over their personal data. These directives impose data-collecting and processing …