Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review
Cloud computing is very popular because of its unique features such as scalability, elasticity,
on-demand service, and security. A large number of tasks are performed simultaneously in a …
on-demand service, and security. A large number of tasks are performed simultaneously in a …
Secure health data sharing for medical cyber-physical systems for the healthcare 4.0
The recent spades of cyber attacks have compromised end-users' data security and privacy
in Medical Cyber-Physical Systems (MCPS) in the era of Health 4.0. Traditional standard …
in Medical Cyber-Physical Systems (MCPS) in the era of Health 4.0. Traditional standard …
Topological graph convolutional network-based urban traffic flow and density prediction
With the development of modern Intelligent Transportation System (ITS), reliable and
efficient transportation information sharing becomes more and more important. Although …
efficient transportation information sharing becomes more and more important. Although …
Distributed attention-based temporal convolutional network for remaining useful life prediction
Y Song, S Gao, Y Li, L Jia, Q Li… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Massive industrial data collected from the Industrial Internet-of-Things (IIoT) assets improve
data-driven methods for prognostics and health management (PHM) systems. As an …
data-driven methods for prognostics and health management (PHM) systems. As an …
Privacy-aware service placement for mobile edge computing via federated learning
Mobile edge clouds can offer delay-sensitive services to users by deploying storage and
computing resources at the network edge. Considering resource-limited edge server, it is …
computing resources at the network edge. Considering resource-limited edge server, it is …
Review on image processing based adversarial example defenses in computer vision
Recent research works showed that deep neural networks are vulnerable to adversarial
examples, which are usually maliciously created by carefully adding deliberate and …
examples, which are usually maliciously created by carefully adding deliberate and …
Towards energy-efficient scheduling for real-time tasks under uncertain cloud computing environment
Green cloud computing has become a major concern in both industry and academia, and
efficient scheduling approaches show promising ways to reduce the energy consumption of …
efficient scheduling approaches show promising ways to reduce the energy consumption of …
Mobility-aware caching and computation offloading in 5G ultra-dense cellular networks
Recent trends show that Internet traffic is increasingly dominated by content, which is
accompanied by the exponential growth of traffic. To cope with this phenomena, network …
accompanied by the exponential growth of traffic. To cope with this phenomena, network …
Cloud infrastructure resource allocation for big data applications
Increasing popular big data applications bring about invaluable information, but along with
challenges to industrial community and academia. Cloud computing with unlimited …
challenges to industrial community and academia. Cloud computing with unlimited …
A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance
The remarkable increasing demands of mitigating losses from cyber incidents for financial
firms has been driving the rapid development of the Cybersecurity Insurance (CI). The …
firms has been driving the rapid development of the Cybersecurity Insurance (CI). The …