Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
A survey on deep learning based Point-of-Interest (POI) recommendations
Abstract Location-based Social Networks (LBSNs) enable users to socialize with friends and
acquaintances by sharing their check-ins, opinions, photos, and reviews. A huge volume of …
acquaintances by sharing their check-ins, opinions, photos, and reviews. A huge volume of …
A systematic review of privacy techniques in recommendation systems
TB Ogunseyi, CB Avoussoukpo, Y Jiang - International Journal of …, 2023 - Springer
The problem of information overload and the necessity for precise information retrieval has
led to the extensive use of recommendation systems (RS). However, ensuring the privacy of …
led to the extensive use of recommendation systems (RS). However, ensuring the privacy of …
Privacy-preserving point-of-interest recommendation based on geographical and social influence
Y Huo, B Chen, J Tang, Y Zeng - Information Sciences, 2021 - Elsevier
We investigate a privacy-preserving problem for point-of-interest (POI) recommendation
system for rapidly growing location-based social networks (LBSNs). The LBSN-based …
system for rapidly growing location-based social networks (LBSNs). The LBSN-based …
Differential privacy-based social network detection over spatio-temporal proximity for secure POI recommendation
With the emergence of technology, there has been a high influx of information over social
networks. Cybersecurity is thus the need of the hour. The crux of cybersecurity is network …
networks. Cybersecurity is thus the need of the hour. The crux of cybersecurity is network …
A novel 1D chaotic system for image encryption, authentication and compression in cloud
H Li, C Yu, X Wang - Multimedia Tools and Applications, 2021 - Springer
To solve the privacy image problem stored in cloud, we propose a compressive sensing
(CS) based image compression, authentication, encryption algorithm in cloud, which can …
(CS) based image compression, authentication, encryption algorithm in cloud, which can …
Providing privacy preserving in next POI recommendation for Mobile edge computing
L Kuang, S Tu, Y Zhang, X Yang - Journal of Cloud Computing, 2020 - Springer
Point of interest (POI) recommendation can benefit users and merchants. It is a very
important and popular service in modern life. In this paper, we aim to study the next new POI …
important and popular service in modern life. In this paper, we aim to study the next new POI …
Multi-granularity contrastive learning model for next POI recommendation
Y Zhu, S Yao, X Sun - Frontiers in Neurorobotics, 2024 - frontiersin.org
Next Point-of-Interest (POI) recommendation aims to predict the next POI for users from their
historical activities. Existing methods typically rely on location-level POI check-in trajectories …
historical activities. Existing methods typically rely on location-level POI check-in trajectories …
PAPIR: privacy-aware personalized information retrieval
A El-Ansari, A Beni-Hssane, M Saadi… - Journal of Ambient …, 2021 - Springer
The problem of information overload on the Internet increased the need for personalized
information retrieval (PIR) systems capable of providing information that corresponds to the …
information retrieval (PIR) systems capable of providing information that corresponds to the …
SecRec: A privacy-preserving method for the context-aware recommendation system
Context-aware recommendation systems are of increasing popularity in the digital era to
recommend personalized items to users. However, how to ensure user data privacy while …
recommend personalized items to users. However, how to ensure user data privacy while …