Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
A survey on energy internet: Architecture, approach, and emerging technologies
Energy crisis and carbon emission have become two seriously concerned issues
universally. As a feasible solution, Energy Internet (EI) has aroused global concern once …
universally. As a feasible solution, Energy Internet (EI) has aroused global concern once …
A federated graph neural network framework for privacy-preserving personalization
Graph neural network (GNN) is effective in modeling high-order interactions and has been
widely used in various personalized applications such as recommendation. However …
widely used in various personalized applications such as recommendation. However …
Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks
Mobile edge computing (MEC) is a promising paradigm to provide cloud-computing
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …
Moth search algorithm: a bio-inspired metaheuristic algorithm for global optimization problems
GG Wang - Memetic Computing, 2018 - Springer
Phototaxis, signifying movement of an organism towards or away from a source of light, is
one of the most representative features for moths. It has recently been shown that one of the …
one of the most representative features for moths. It has recently been shown that one of the …
Security, privacy & efficiency of sustainable cloud computing for big data & IoT
C Stergiou, KE Psannis, BB Gupta… - … Computing: Informatics and …, 2018 - Elsevier
With the significant advances in communication technologies and in many other sectors,
also are growing up security and privacy issues. In our research, is introduced a base …
also are growing up security and privacy issues. In our research, is introduced a base …
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …
current cloud computing scenario. The majority of the existing techniques are focusing on …
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
An efficient public auditing protocol with novel dynamic structure for cloud data
With the rapid development of cloud computing, cloud storage has been accepted by an
increasing number of organizations and individuals, therein serving as a convenient and on …
increasing number of organizations and individuals, therein serving as a convenient and on …
Privacy-preserving outsourced classification in cloud computing
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …