Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Pseudonym schemes in vehicular networks: A survey
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …
and messages. Yet, privacy of individual vehicles and drivers must be maintained …
Does -Anonymous Microaggregation Affect Machine-Learned Macrotrends?
In the era of big data, the availability of massive amounts of information makes privacy
protection more necessary than ever. Among a variety of anonymization mechanisms …
protection more necessary than ever. Among a variety of anonymization mechanisms …
Pay-per-tracking: A collaborative masking model for web browsing
Web tracking is the key enabling technology of modern online advertising and, at the same
time, the source of serious privacy concerns. In recent years, we have witnessed the …
time, the source of serious privacy concerns. In recent years, we have witnessed the …
The fast maximum distance to average vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data
The massive exploitation of tons of data is currently guiding critical decisions in domains
such as economics or health. But serious privacy risks arise since personal data is …
such as economics or health. But serious privacy risks arise since personal data is …
Reconciling privacy and efficient utility management in smart cities
ABSTRACT A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient
management of utilities, enabled by technologies such as those entailing smart metering of …
management of utilities, enabled by technologies such as those entailing smart metering of …
p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation
We develop a probabilistic variant of k-anonymous microaggregation which we term p-
probabilistic resorting to a statistical model of respondent participation in order to aggregate …
probabilistic resorting to a statistical model of respondent participation in order to aggregate …
Protecting query privacy in location-based services
The popularity of location-based services (LBSs) leads to severe concerns on users' privacy.
With the fast growth of Internet applications such as online social networks, more user …
With the fast growth of Internet applications such as online social networks, more user …
[HTML][HTML] Entropy-based privacy against profiling of user mobility
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an
evident privacy risk. The locations accompanying the LBS queries can be exploited by the …
evident privacy risk. The locations accompanying the LBS queries can be exploited by the …
A survey on measuring anonymity in anonymous communication systems
The popularity of Internet applications has made communication privacy an increasingly
important security requirement. As an important aspect of privacy, anonymity ensures that a …
important security requirement. As an important aspect of privacy, anonymity ensures that a …
-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing
Z Chen, L Yao, H Hu, G Wu - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Current privacy-preservation data publishing technologies primarily focus on anonymizing
datasets, often overlooking the inherent privacy degrees embedded within the data. This …
datasets, often overlooking the inherent privacy degrees embedded within the data. This …