Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on cryptographic techniques for protecting big data security: present and forthcoming
S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …
and provide novel ways of exploring the world. As they significantly create economic and …
Privacy-preserving object detection for medical images with faster R-CNN
In this paper, we propose a lightweight privacy-preserving Faster R-CNN framework
(SecRCNN) for object detection in medical images. Faster R-CNN is one of the most …
(SecRCNN) for object detection in medical images. Faster R-CNN is one of the most …
Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing
Mobile crowdsensing enables convenient sensory data collection from a large number of
mobile devices and has found various applications. In the real practice, however, the …
mobile devices and has found various applications. In the real practice, however, the …
PriRadar: A privacy-preserving framework for spatial crowdsourcing
Privacy leakage is a serious issue in spatial crowdsourcing in various scenarios. In this
paper, we study privacy protection in spatial crowdsourcing. The main challenge is to …
paper, we study privacy protection in spatial crowdsourcing. The main challenge is to …
No peek: A survey of private distributed deep learning
We survey distributed deep learning models for training or inference without accessing raw
data from clients. These methods aim to protect confidential patterns in data while still …
data from clients. These methods aim to protect confidential patterns in data while still …
Privacy-aware and efficient mobile crowdsensing with truth discovery
Truth discovery in mobile crowdsensing has recently received wide attention. It refers to the
procedure for estimating the unknown user reliability from collected sensory data and …
procedure for estimating the unknown user reliability from collected sensory data and …
Secure fine-grained encrypted keyword search for e-healthcare cloud
E-Healthcare systems are increasingly popular due to the introduction of wearable
healthcare devices and sensors. Personal health records (PHRs) are collected by these …
healthcare devices and sensors. Personal health records (PHRs) are collected by these …
A multi-level privacy-preserving scheme for extracting traffic images
X He, L Li, H Peng, F Tong - Signal Processing, 2024 - Elsevier
Traffic images are constantly used as a stick to assess traffic conditions. Traffic flow statistical
analysis, road condition safety monitoring, vehicle violation detection, accident surveillance …
analysis, road condition safety monitoring, vehicle violation detection, accident surveillance …
A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial internet of things
In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, and
companies are highly motivated to store the data on cloud servers for cost saving and …
companies are highly motivated to store the data on cloud servers for cost saving and …
Towards private similarity query based healthcare monitoring over digital twin cloud platform
As the growing proportion of aging population, the demand for sustainable, high quality, and
timely healthcare services has become increasingly pressing, especially since the outbreak …
timely healthcare services has become increasingly pressing, especially since the outbreak …