Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The evolution of distributed systems for graph neural networks and their origin in graph processing and deep learning: A survey
Graph neural networks (GNNs) are an emerging research field. This specialized deep
neural network architecture is capable of processing graph structured data and bridges the …
neural network architecture is capable of processing graph structured data and bridges the …
Adversarial attacks and defenses in deep learning: From a perspective of cybersecurity
The outstanding performance of deep neural networks has promoted deep learning
applications in a broad set of domains. However, the potential risks caused by adversarial …
applications in a broad set of domains. However, the potential risks caused by adversarial …
A robust game-theoretical federated learning framework with joint differential privacy
Federated learning is a promising distributed machine learning paradigm that has been
playing a significant role in providing privacy-preserving learning solutions. However …
playing a significant role in providing privacy-preserving learning solutions. However …
Adversarial attacks against deep generative models on data: A survey
Deep generative models have gained much attention given their ability to generate data for
applications as varied as healthcare to financial technology to surveillance, and many more …
applications as varied as healthcare to financial technology to surveillance, and many more …
Scenario-based adaptations of differential privacy: A technical survey
Differential privacy has been a de facto privacy standard in defining privacy and handling
privacy preservation. It has had great success in scenarios of local data privacy and …
privacy preservation. It has had great success in scenarios of local data privacy and …
A personalized privacy preserving mechanism for crowdsourced federated learning
In this paper, we focus on the privacy preserving mechanism design for crowdsourced
Federated Learning (FL), where a requester can outsource its model training task to some …
Federated Learning (FL), where a requester can outsource its model training task to some …
A game-theoretic method for defending against advanced persistent threats in cyber systems
Advanced persistent threats (APTs) are one of today's major threats to cyber security. Highly
determined attackers along with novel and evasive exfiltration techniques mean APT attacks …
determined attackers along with novel and evasive exfiltration techniques mean APT attacks …
Learning games for defending advanced persistent threats in cyber systems
A cyber system may face to multiple attackers from diverse adversaries, who usually employ
sophisticated techniques to both continuously steal sensitive data and avoid being detected …
sophisticated techniques to both continuously steal sensitive data and avoid being detected …
Incentives in private collaborative machine learning
Collaborative machine learning involves training models on data from multiple parties but
must incentivize their participation. Existing data valuation methods fairly value and reward …
must incentivize their participation. Existing data valuation methods fairly value and reward …
Crowdfa: A privacy-preserving mobile crowdsensing paradigm via federated analytics
Mobile crowdsensing (MCS) systems typically struggle to address the challenge of data
aggregation, incentive design, and privacy protection, simultaneously. However, existing …
aggregation, incentive design, and privacy protection, simultaneously. However, existing …