Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Efficiently computing similarities to private datasets
Many methods in differentially private model training rely on computing the similarity
between a query point (such as public or synthetic data) and private data. We abstract out …
between a query point (such as public or synthetic data) and private data. We abstract out …
Vehicle-based secure location clustering for IoT-equipped building and facility management in smart city
H Wu, L Li, Y Liu, X Wu - Building and Environment, 2022 - Elsevier
Vehicles equipped with various sensing devices have the strong ability to generate location
information, which is beneficial to a lot of applications in smart city. In special, it is important …
information, which is beneficial to a lot of applications in smart city. In special, it is important …
Multiform evolution for high-dimensional problems with low effective dimensionality
In this paper, we scale evolutionary algorithms to high-dimensional optimization problems
that deceptively possess a low effective dimensionality (certain dimensions do not …
that deceptively possess a low effective dimensionality (certain dimensions do not …
The Johnson-Lindenstrauss lemma for clustering and subspace approximation: From coresets to dimension reduction
We study the effect of Johnson-Lindenstrauss transforms in various projective clustering
problems, generalizing results which only applied to center-based clustering [40]. We ask …
problems, generalizing results which only applied to center-based clustering [40]. We ask …
Moderate Dimension Reduction for -Center Clustering
The Johnson-Lindenstrauss (JL) Lemma introduced the concept of dimension reduction via
a random linear map, which has become a fundamental technique in many computational …
a random linear map, which has become a fundamental technique in many computational …
A Multilinear Johnson-Lindenstrauss Transform
Abstract The Johnson-Lindenstrauss family of transforms constitutes a key algorithmic tool
for reducing the dimensionality of a Euclidean space with low distortion of distances …
for reducing the dimensionality of a Euclidean space with low distortion of distances …
Improving Algorithmic Efficiency using Cryptography
Cryptographic primitives have been used for various non-cryptographic objectives, such as
eliminating or reducing randomness and interaction. We show how to use cryptography to …
eliminating or reducing randomness and interaction. We show how to use cryptography to …
A Bi-metric Framework for Fast Similarity Search
We propose a new" bi-metric" framework for designing nearest neighbor data structures. Our
framework assumes two dissimilarity functions: a ground-truth metric that is accurate but …
framework assumes two dissimilarity functions: a ground-truth metric that is accurate but …
Near-Optimal Dimension Reduction for Facility Location
L Huang, SHC Jiang, R Krauthgamer, D Yue - arxiv preprint arxiv …, 2024 - arxiv.org
Oblivious dimension reduction,\{a} la the Johnson-Lindenstrauss (JL) Lemma, is a
fundamental approach for processing high-dimensional data. We study this approach for …
fundamental approach for processing high-dimensional data. We study this approach for …
Efficient Algorithms for Vector Similarities
SB Silwal - 2024 - dspace.mit.edu
A key cog in machine learning is the humble embedding: vector representations of real
world objects such as text, images, graphs, or molecules whose geometric similarities …
world objects such as text, images, graphs, or molecules whose geometric similarities …