Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
BSIS: Blockchain-based secure incentive scheme for energy delivery in vehicular energy network
Vehicular energy network (VEN), as an important part of the Internet of Things for the smart
city, can facilitate the renewable energy (RE) transportation over a large geographical area …
city, can facilitate the renewable energy (RE) transportation over a large geographical area …
A multi-stage stochastic programming-based offloading policy for fog enabled IoT-eHealth
To meet low latency and real-time monitoring demands of IoT-eHealth, fog computing is
envisioned as a key technology to offer elastic computing resource at the edge of networks …
envisioned as a key technology to offer elastic computing resource at the edge of networks …
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing
Smart devices offer a variety of more convenient forms to help us record our lives and
generate a large amount of data in this process. Limited by the local storage capacity, many …
generate a large amount of data in this process. Limited by the local storage capacity, many …
A review of cyber security in cryptography: Services, attacks, and key approach
Security has become more important in several industries in recent years. It's not that the
necessity to protect data is new; it dates back to the first and second world wars, and even to …
necessity to protect data is new; it dates back to the first and second world wars, and even to …
Multi-key spatio-temporal chaotic image encryption and retrieval scheme
To protect privacy, many users opt to encrypt images prior to outsourcing them to cloud
service platforms (CSPs). However, this encryption process results in the loss of image …
service platforms (CSPs). However, this encryption process results in the loss of image …
An efficient delay aware emergency message dissemination and data retrieval in secure VANET-cloud environment
M Al-Shabi - Wireless Personal Communications, 2023 - Springer
Over the recent decades, incorporating Vehicular Ad-hoc Network (VANET) into Cloud
computing plays a vital role, since it provides a reliable safety journey to vehicular drivers …
computing plays a vital role, since it provides a reliable safety journey to vehicular drivers …
Privacy-preserving searchable encryption in the intelligent edge computing
In intelligent edge computing, the private data of users are partly or entirely outsourced to
the intelligent edge nodes for processing. To enforce security and privacy on edge network …
the intelligent edge nodes for processing. To enforce security and privacy on edge network …
[HTML][HTML] A privacy-protected image retrieval scheme for fast and secure image search
A Du, L Wang, S Cheng, N Ao - Symmetry, 2020 - mdpi.com
With the development of multimedia technology, the secure image retrieval scheme has
become a hot research topic. However, how to further improve algorithm performance in the …
become a hot research topic. However, how to further improve algorithm performance in the …
An efficient model for vehicular cloud computing with prioritizing computing resources
M Tahmasebi, MR Khayyambashi - Peer-to-Peer Networking and …, 2019 - Springer
In recent years, even though there has been a lot of progress in automotive industry and
their offered services but not all of their computational capacities have yet been used. The …
their offered services but not all of their computational capacities have yet been used. The …
A secure road condition monitoring scheme in cloud based VANET
Connected vehicular cloud computing (CVCC) is a promising technology that integrates
cloud computing and vehicular ad-hoc network (VANET) for road condition monitoring tasks …
cloud computing and vehicular ad-hoc network (VANET) for road condition monitoring tasks …