Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Toward privacy preservation using clustering based anonymization: recent advances and future research outlook
With the continuous increase in avenues of personal data generation, privacy protection has
become a hot research topic resulting in various proposed mechanisms to address this …
become a hot research topic resulting in various proposed mechanisms to address this …
Measurement and applications: Exploring the challenges and opportunities of hierarchical federated learning in sensor applications
Sensor applications have become ubiquitous in modern society as the digital age continues
to advance. AI-based techniques (eg, machine learning) are effective at extracting …
to advance. AI-based techniques (eg, machine learning) are effective at extracting …
[HTML][HTML] Blockchain and differential privacy-based data processing system for data security and privacy in urban computing
G Heo, I Doh - Computer Communications, 2024 - Elsevier
Recently, big data related to human movement, air quality, and meteorology have been
generated in urban computing through sensing technology and the computing infrastructure …
generated in urban computing through sensing technology and the computing infrastructure …
[HTML][HTML] Interpretable intrusion detection for next generation of Internet of Things
This paper presents a new framework for intrusion detection in the next-generation Internet
of Things. MinMax normalization strategy is used to collect and preprocess data. The Marine …
of Things. MinMax normalization strategy is used to collect and preprocess data. The Marine …
BiGRU-DP: Improved differential privacy protection method for trajectory data publishing
Z Shen, Y Zhang, H Wang, P Liu, K Liu… - Expert Systems with …, 2024 - Elsevier
Ignoring the temporal relationship of position points in trajectory data or the change in the
number of position points in dummy trajectory generation can result in inadequate data …
number of position points in dummy trajectory generation can result in inadequate data …
Secure multi-party computation with secret sharing for real-time data aggregation in IIoT
Real-time analytics in Industrial Internet-of-Things (IIoT) has received remarkable attention
recently due to its capacity to prevent downtime and manage risks. However, the sensed …
recently due to its capacity to prevent downtime and manage risks. However, the sensed …
Multimedia security and privacy protection in the internet of things: research developments and challenges
With the rapid growth of the internet of things (IoT), huge amounts of multimedia data are
being generated from and/or exchanged through various IoT devices, systems and …
being generated from and/or exchanged through various IoT devices, systems and …
Federated learning: A cutting-edge survey of the latest advancements and applications
Robust machine learning (ML) models can be developed by leveraging large volumes of
data and distributing the computational tasks across numerous devices or servers …
data and distributing the computational tasks across numerous devices or servers …
Differential Privacy with Weighted∊ for Privacy-Preservation in Human Activity Recognition
R Fujimoto, Y Nakamura… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Many services based on human activity recognition (HAR) have been developed; however,
user activity data include a large amount of private information. Although privacy protection …
user activity data include a large amount of private information. Although privacy protection …
Federated learning: A cutting-edge survey of the latest advancements and applications
Robust machine learning (ML) models can be developed by leveraging large volumes of
data and distributing the computational tasks across numerous devices or servers …
data and distributing the computational tasks across numerous devices or servers …