Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on cyber–physical systems security
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …
computing, control, and communication technologies, bridging the cyberspace and physical …
Horizontal federated recommender system: A survey
Due to underlying privacy-sensitive information in user-item interaction data, the risk of
privacy leakage exists in the centralized-training recommender system (RecSys). To this …
privacy leakage exists in the centralized-training recommender system (RecSys). To this …
Making ai forget you: Data deletion in machine learning
Intense recent discussions have focused on how to provide individuals with control over
when their data can and cannot be used---the EU's Right To Be Forgotten regulation is an …
when their data can and cannot be used---the EU's Right To Be Forgotten regulation is an …
Privacy-preserving machine learning: Threats and solutions
For privacy concerns to be addressed adequately in today's machine-learning (ML) systems,
the knowledge gap between the ML and privacy communities must be bridged. This article …
the knowledge gap between the ML and privacy communities must be bridged. This article …
A survey on trustworthy recommender systems
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …
deployed in almost every corner of the web and facilitate the human decision-making …
Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …
Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …
contexts. For instance, with the emergence of distributed applications, several providers are …
Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
In recent years, signal processing applications that deal with user-related data have aroused
privacy concerns. For instance, face recognition and personalized recommendations rely on …
privacy concerns. For instance, face recognition and personalized recommendations rely on …
Privacy in targeted advertising on mobile devices: a survey
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …
businesses, by creating new opportunities for advertisers to reach prospective customers by …