Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy on 6G network edge: A survey
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …
A survey of explainable artificial intelligence for smart cities
The emergence of Explainable Artificial Intelligence (XAI) has enhanced the lives of humans
and envisioned the concept of smart cities using informed actions, enhanced user …
and envisioned the concept of smart cities using informed actions, enhanced user …
A survey on federated learning: The journey from centralized to distributed on-site learning and beyond
S AbdulRahman, H Tout… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Driven by privacy concerns and the visions of deep learning, the last four years have
witnessed a paradigm shift in the applicability mechanism of machine learning (ML). An …
witnessed a paradigm shift in the applicability mechanism of machine learning (ML). An …
Security issues in Internet of Vehicles (IoV): A comprehensive survey
Nowadays, connected vehicles have a major role in enhancing the driving experience.
Connected vehicles in the network share their knowledge with the help of the network …
Connected vehicles in the network share their knowledge with the help of the network …
Delay-sensitive task offloading in vehicular fog computing-assisted platoons
Vehicles in platoons need to process many tasks to support various real-time vehicular
applications. When a task arrives at a vehicle, the vehicle may not process the task due to its …
applications. When a task arrives at a vehicle, the vehicle may not process the task due to its …
Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities
The emergence of smart cities is an example of how new technologies, such as the Internet
of Things (IoT), have facilitated the creation of extensive interconnected and intelligent …
of Things (IoT), have facilitated the creation of extensive interconnected and intelligent …
Intrusion detection in the iot under data and concept drifts: Online deep learning approach
OA Wahab - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Although the existing machine learning-based intrusion detection systems in the Internet of
Things (IoT) usually perform well in static environments, they struggle to preserve their …
Things (IoT) usually perform well in static environments, they struggle to preserve their …
On demand fog federations for horizontal federated learning in IoV
Federated learning using fog computing can suffer from the dynamic behavior of some of the
participants in its training process, especially in Internet-of-Vehicles where vehicles are the …
participants in its training process, especially in Internet-of-Vehicles where vehicles are the …
Intrusion detection for secure social internet of things based on collaborative edge computing: a generative adversarial network-based approach
The Social Internet of Things (SIoT) now penetrates our daily lives. As a strategy to alleviate
the escalation of resource congestion, collaborative edge computing (CEC) has become a …
the escalation of resource congestion, collaborative edge computing (CEC) has become a …
[HTML][HTML] Optimized machine learning-based intrusion detection system for fog and edge computing environment
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …