Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on blockchain in industrial internet of things: Motivations, research progresses, and future challenges
R Huo, S Zeng, Z Wang, J Shang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With rapid development of enabling technologies such as Internet of Things, robotics, and
big data, the fourth industrial revolution known as “Industry 4.0”(I4. 0) has become a great …
big data, the fourth industrial revolution known as “Industry 4.0”(I4. 0) has become a great …
[HTML][HTML] The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research
In today's world, it is vital to have strong cybersecurity measures in place. To combat the
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …
Understanding blockchain applications in Industry 4.0: From information technology to manufacturing and operations management
The current literature regarding blockchain-based applications in the context of Industry 4.0
has rapidly grown during the last decade. However, a systematic literature review that …
has rapidly grown during the last decade. However, a systematic literature review that …
The relationship of personal data protection towards internet addiction: Cyber crimes, pornography and reduced physical activity
Internet as a platform has provided negative implications in the form of addiction, where
certain users can present harm and damage to the other individual or community due to its …
certain users can present harm and damage to the other individual or community due to its …
An explainable semi-personalized federated learning model
Training a model using batch learning requires uniform data storage in a repository. This
approach is intrusive, as users have to expose their privacy and exchange sensitive data by …
approach is intrusive, as users have to expose their privacy and exchange sensitive data by …
Enhancing malware detection through machine learning using XAI with SHAP framework
Malware represents a significant cyber threat that can potentially disrupt any activities within
an organization. There is a need to devise effective proactive methods for malware …
an organization. There is a need to devise effective proactive methods for malware …
[HTML][HTML] Enhancing the security and privacy in the IoT supply chain using blockchain and federated learning with trusted execution environment
L Zhu, S Hu, X Zhu, C Meng, M Huang - Mathematics, 2023 - mdpi.com
Federated learning has emerged as a promising technique for the Internet of Things (IoT) in
various domains, including supply chain management. It enables IoT devices to …
various domains, including supply chain management. It enables IoT devices to …
Federated auto-meta-ensemble learning framework for AI-enabled military operations
One of the promises of AI in the military domain that seems to guarantee its adoption is its
broad applicability. In a military context, the potential for AI is present in all operational …
broad applicability. In a military context, the potential for AI is present in all operational …
A Blockchained Secure and Integrity-Preserved Architecture for Military Logistics Operations
The employment of 5G Internet of Things (5G-IoT), smart automation, and AI analytics can
provide improved military logistics, by enhancing inventory control, reordering, accuracy …
provide improved military logistics, by enhancing inventory control, reordering, accuracy …
An Enhanced Threat Detection Model to Assist Supply Chain Management Using Artificial Intelligence
N Ambika - Artificial Intelligence‐Enabled Digital Twin for Smart …, 2024 - Wiley Online Library
The previous framework combines computer algorithms and physical processes to create a
comprehensive system. Risk on Screen Character is a potential threat actor or hacker who …
comprehensive system. Risk on Screen Character is a potential threat actor or hacker who …