Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trust management in social Internet of Things: A taxonomy, open issues, and challenges
Abstract Internet of Things (IoT) is an emerging area in which billions of smart objects are
interconnected with each other using Internet for data and resource sharing. These smart …
interconnected with each other using Internet for data and resource sharing. These smart …
Fast federated machine unlearning with nonlinear functional theory
Federated machine unlearning (FMU) aims to remove the influence of a specified subset of
training data upon request from a trained federated learning model. Despite achieving …
training data upon request from a trained federated learning model. Despite achieving …
Accelerated federated learning with decoupled adaptive optimization
The federated learning (FL) framework enables edge clients to collaboratively learn a
shared inference model while kee** privacy of training data on clients. Recently, many …
shared inference model while kee** privacy of training data on clients. Recently, many …
Decentralized trust management: Risk analysis and trust aggregation
X Fan, L Liu, R Zhang, Q **g, J Bi - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Decentralized trust management is used as a referral benchmark for assisting decision
making by human or intelligence machines in open collaborative systems. During any given …
making by human or intelligence machines in open collaborative systems. During any given …
Prompt certified machine unlearning with randomized gradient smoothing and quantization
The right to be forgotten calls for efficient machine unlearning techniques that make trained
machine learning models forget a cohort of data. The combination of training and unlearning …
machine learning models forget a cohort of data. The combination of training and unlearning …
Comparing and evaluating interest points
Many computer vision tasks rely on feature extraction. Interest points are such features. This
paper shows that interest points are geometrically stable under different transformations and …
paper shows that interest points are geometrically stable under different transformations and …
Adversarial attacks on deep graph matching
Despite achieving remarkable performance, deep graph learning models, such as node
classification and network embedding, suffer from harassment caused by small adversarial …
classification and network embedding, suffer from harassment caused by small adversarial …
Dimension-independent certified neural network watermarks via mollifier smoothing
Certified_Watermarks is the first to provide a watermark certificate against $ l_2 $-norm
watermark removal attacks, by leveraging the randomized smoothing techniques for certified …
watermark removal attacks, by leveraging the randomized smoothing techniques for certified …
Expressive 1-lipschitz neural networks for robust multiple graph learning against adversarial attacks
Recent findings have shown multiple graph learning models, such as graph classification
and graph matching, are highly vulnerable to adversarial attacks, ie small input …
and graph matching, are highly vulnerable to adversarial attacks, ie small input …
Federated fingerprint learning with heterogeneous architectures
Recent studies on federated learning (FL) have sought to solve the system heterogeneity
issue by designing customized local models for different clients. However, public dataset …
issue by designing customized local models for different clients. However, public dataset …