Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …
span many different domains, ranging from online social network data from networks like …
The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization
Recently there has been quite a number of independent research activities that investigated
the potentialities of integrating social networking concepts into Internet of Things (IoT) …
the potentialities of integrating social networking concepts into Internet of Things (IoT) …
Cryptocurrency networks: A new P2P paradigm
P2P networks are the mechanism used by cryptocurrencies to disseminate system
information while kee** the whole system as much decentralized as possible …
information while kee** the whole system as much decentralized as possible …
Smartbuddy: defining human behaviors using big data analytics in social internet of things
As we delve into the Internet of Things, we are witnessing intensive interaction and
heterogeneous communication among different devices over the Internet. Consequently …
heterogeneous communication among different devices over the Internet. Consequently …
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among
entities that participate in various protocols. Trust relations are based on evidence created …
entities that participate in various protocols. Trust relations are based on evidence created …
Taxonomy of trust: Categorizing P2P reputation systems
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is
to organize existing ideas and work to facilitate system design. We present a taxonomy of …
to organize existing ideas and work to facilitate system design. We present a taxonomy of …
[PDF][PDF] A survey of solutions to the sybil attack
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …
to attacks when these assumptions are violated. For example, impersonation is the well …
{SecGraph}: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …
Sybil-resistant DHT routing
Abstract Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but
at the same time vulnerable to disruptive nodes. Designers of such systems want them used …
at the same time vulnerable to disruptive nodes. Designers of such systems want them used …
Preserving link privacy in social network based systems
A growing body of research leverages social network based trust relationships to improve
the functionality of the system. However, these systems expose users' trust relationships …
the functionality of the system. However, these systems expose users' trust relationships …