Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Verification of initial-state opacity in security applications of discrete event systems
A Saboori, CN Hadjicostis - Information Sciences, 2013 - Elsevier
In this paper, we formulate and analyze methodologies for verifying the notion of initial-state
opacity in discrete event systems that are modeled as non-deterministic finite automata with …
opacity in discrete event systems that are modeled as non-deterministic finite automata with …
An anonymization-based privacy-preserving data collection protocol for digital health data
J Andrew, RJ Eunice, J Karthikeyan - Frontiers in public health, 2023 - frontiersin.org
Digital health data collection is vital for healthcare and medical research. But it contains
sensitive information about patients, which makes it challenging. To collect health data …
sensitive information about patients, which makes it challenging. To collect health data …
An anonymization protocol for continuous and dynamic privacy-preserving data collection
Collecting personal data without privacy breaches is important to utilize distributed
microdata. Privacy-preserving data collection is anonymizing personal data within the data …
microdata. Privacy-preserving data collection is anonymizing personal data within the data …
Does -Anonymous Microaggregation Affect Machine-Learned Macrotrends?
A Rodriguez-Hoyos, J Estrada-Jiménez… - IEEE …, 2018 - ieeexplore.ieee.org
In the era of big data, the availability of massive amounts of information makes privacy
protection more necessary than ever. Among a variety of anonymization mechanisms …
protection more necessary than ever. Among a variety of anonymization mechanisms …
An efficient privacy preserving protocol for dynamic continuous data collection
Past and ongoing decades have witnessed significant uplift in data generation due to ever
growing sources of data. Collection and aggradation of such huge data have triggered …
growing sources of data. Collection and aggradation of such huge data have triggered …
[KNJIGA][B] Verification and enforcement of state-based notions of opacity in discrete event systems
A Saboori - 2010 - search.proquest.com
Motivated by security and privacy considerations in applications of discrete event systems,
we describe and analyze the complexity of verifying various state-based notions of opacity in …
we describe and analyze the complexity of verifying various state-based notions of opacity in …
A modification of the Lloyd algorithm for k-anonymous quantization
We address the problem of designing quantizers that cluster data while satisfying a k-
anonymity requirement. A general data compression perspective is adopted, which …
anonymity requirement. A general data compression perspective is adopted, which …
Privacy preserving data publishing of categorical data through k‐anonymity and feature selection
In healthcare, there is a vast amount of patients' data, which can lead to important
discoveries if combined. Due to legal and ethical issues, such data cannot be shared and …
discoveries if combined. Due to legal and ethical issues, such data cannot be shared and …
A look into SIMON from a side-channel perspective
SIMON is a lightweight block cipher, specially designed for resource constrained devices
that was recently presented by the National Security Agency (NSA). This paper deals with a …
that was recently presented by the National Security Agency (NSA). This paper deals with a …
Privacy-preserving publishing of opinion polls
Public opinion is the belief or thoughts of the public regarding a particular topic, especially
one regarding politics, religion or social issues. Opinions may be sensitive since they may …
one regarding politics, religion or social issues. Opinions may be sensitive since they may …