Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Location privacy-preserving mechanisms in location-based services: A comprehensive survey
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
What are the trend and core knowledge of information security? A citation and co-citation analysis
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …
potential safety hazards to organizations. In response to the increasing academia and …
Geo-indistinguishability: Differential privacy for location-based systems
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …
easily collect huge amounts of information regarding users' location, has recently started …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
LSTM-TrajGAN: A deep learning approach to trajectory privacy protection
The prevalence of location-based services contributes to the explosive growth of individual-
level trajectory data and raises public concerns about privacy issues. In this research, we …
level trajectory data and raises public concerns about privacy issues. In this research, we …
Pseudonym schemes in vehicular networks: A survey
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …
and messages. Yet, privacy of individual vehicles and drivers must be maintained …
A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing
Location-based services have become prevalent and the risk of location privacy leakage
increases. Most existing schemes use third-party-based or third-party-free system …
increases. Most existing schemes use third-party-based or third-party-free system …
Achieving k-anonymity in privacy-aware location-based services
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the
convenience provided by LBS, users may lose privacy since the untrusted LBS server has …
convenience provided by LBS, users may lose privacy since the untrusted LBS server has …
Smart city IoT platform respecting GDPR privacy and security aspects
The Internet of Things (IoT) paradigm enables computation and communication among tools
that everyone uses daily. The vastness and heterogeneity of devices and their composition …
that everyone uses daily. The vastness and heterogeneity of devices and their composition …