Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trustworthy graph neural networks: Aspects, methods, and trends
Graph neural networks (GNNs) have emerged as a series of competent graph learning
methods for diverse real-world scenarios, ranging from daily applications such as …
methods for diverse real-world scenarios, ranging from daily applications such as …
Pika: Secure computation using function secret sharing over rings
S Wagh - Proceedings on Privacy Enhancing Technologies, 2022 - petsymposium.org
Machine learning algorithms crucially depend on non-linear mathematical functions such as
division (for normalization), exponentiation (for softmax and sigmoid), tanh (as an activation …
division (for normalization), exponentiation (for softmax and sigmoid), tanh (as an activation …
Communication-efficient privacy-preserving neural network inference via arithmetic secret sharing
Well-trained neural network models are deployed on edge servers to provide valuable
inference services for clients. To protect data privacy, a promising way is to exploit various …
inference services for clients. To protect data privacy, a promising way is to exploit various …
ABNN2 secure two-party arbitrary-bitwidth quantized neural network predictions
L Shen, Y Dong, B Fang, J Shi, X Wang… - Proceedings of the 59th …, 2022 - dl.acm.org
Data privacy and security issues are preventing a lot of potential on-cloud machine learning
as services from happening. In the recent past, secure multi-party computation (MPC) has …
as services from happening. In the recent past, secure multi-party computation (MPC) has …
MPClan: Protocol suite for privacy-conscious computations
The growing volumes of data being collected and its analysis to provide better services are
creating worries about digital privacy. To address privacy concerns and give practical …
creating worries about digital privacy. To address privacy concerns and give practical …
A novel privacy-preserving graph convolutional network via secure matrix multiplication
Graph convolutional network (GCN) is one of the most representative methods in the realm
of graph neural networks (GNNs). In the convolution process, GCN combines the structural …
of graph neural networks (GNNs). In the convolution process, GCN combines the structural …
SPEFL: efficient security and privacy-enhanced federated learning against poisoning attacks
L Shen, Z Ke, J Shi, X Zhang, Y Sun… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is a distributed machine learning paradigm in the Internet of Things
(IoT), which allows multiple devices to collaboratively train models without leaking local …
(IoT), which allows multiple devices to collaboratively train models without leaking local …
Manto: A practical and secure inference service of convolutional neural networks for iot
As convolutional neural networks (CNNs) exhibit remarkable performance in various
inference tasks, it is increasingly important to enable Internet of Things (IoT) devices to …
inference tasks, it is increasingly important to enable Internet of Things (IoT) devices to …
Entrada to Secure Graph Convolutional Networks
Graph convolutional networks (GCNs) are gaining popularity due to their powerful modelling
capabilities. However, guaranteeing privacy is an issue when evaluating on inputs that …
capabilities. However, guaranteeing privacy is an issue when evaluating on inputs that …
A secure and fair double auction framework for cloud virtual machines
Double auction is one of the most promising solutions to allocate virtual machine (VM)
resources in two-sided cloud markets, which can increase the utilization rate of VM …
resources in two-sided cloud markets, which can increase the utilization rate of VM …