Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The applications of nature‐inspired algorithms in Internet of Things‐based healthcare service: A systematic literature review
Z Amiri, A Heidari, M Zavvar… - Transactions on …, 2024 - Wiley Online Library
Nature‐inspired algorithms revolve around the intersection of nature‐inspired algorithms
and the IoT within the healthcare domain. This domain addresses the emerging trends and …
and the IoT within the healthcare domain. This domain addresses the emerging trends and …
[HTML][HTML] Intelligent architecture and platforms for private edge cloud systems: A review
The development of cloud, fog, and edge computing has led to great advances in reducing
latency and saving bandwidth, and these methods have therefore been broadly applied in …
latency and saving bandwidth, and these methods have therefore been broadly applied in …
A novel blockchain-based deepfake detection method using federated and deep learning models
In recent years, the proliferation of deep learning (DL) techniques has given rise to a
significant challenge in the form of deepfake videos, posing a grave threat to the authenticity …
significant challenge in the form of deepfake videos, posing a grave threat to the authenticity …
Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage
Cloud computing eliminates the need for local hardware, addressing the challenge of high
computing expenses. However, entrusting data to the cloud may pose the risk of …
computing expenses. However, entrusting data to the cloud may pose the risk of …
Secure AI for 6G mobile devices: Deep learning optimization against side-channel attacks
Deep learning-driven side-channel analysis (SCA) is a promising approach to side-channel
analytic profiling. Recent studies have shown that neural networks can successfully attack …
analytic profiling. Recent studies have shown that neural networks can successfully attack …
Advancements in intrusion detection: A lightweight hybrid RNN-RF model
Computer networks face vulnerability to numerous attacks, which pose significant threats to
our data security and the freedom of communication. This paper introduces a novel intrusion …
our data security and the freedom of communication. This paper introduces a novel intrusion …
Dynamic consensus committee-based for secure data sharing with authorized multi-receiver searchable encryption
N Yang, C Tang, Q Zhou, D He - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data management services provided by the public cloud can economize the enterprise's
local storage costs, and meanwhile, realize data sharing among the enterprise. Corporate …
local storage costs, and meanwhile, realize data sharing among the enterprise. Corporate …
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques …
W Hu, Q Cao, M Darbandi, N Jafari Navimipour - Cluster Computing, 2024 - Springer
The number of cloud-, edge-, and Internet of Things (IoT)-based applications that produce
sensitive and personal data has rapidly increased in recent years. The IoT is a new model …
sensitive and personal data has rapidly increased in recent years. The IoT is a new model …
{FEASE}: Fast and Expressive Asymmetric Searchable Encryption
Asymmetric Searchable Encryption (ASE) is a promising cryptographic mechanism that
enables a semi-trusted cloud server to perform keyword searches over encrypted data for …
enables a semi-trusted cloud server to perform keyword searches over encrypted data for …
[HTML][HTML] A biometrics-generated private/public key cryptography for a blockchain-based e-voting system
Voting aims to provide the best decision or select the most selected option for the largest
group of voters. Malicious parties gaining access, and otherwise tampering with election …
group of voters. Malicious parties gaining access, and otherwise tampering with election …