Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on differential privacy for unstructured data content
Huge amounts of unstructured data including image, video, audio, and text are ubiquitously
generated and shared, and it is a challenge to protect sensitive personal information in …
generated and shared, and it is a challenge to protect sensitive personal information in …
Privacy preserving social network data publication
JH Abawajy, MIH Ninggal… - … communications surveys & …, 2016 - ieeexplore.ieee.org
The introduction of online social networks (OSN) has transformed the way people connect
and interact with each other as well as share information. OSN have led to a tremendous …
and interact with each other as well as share information. OSN have led to a tremendous …
Linkteller: Recovering private edges from graph neural networks via influence analysis
Graph structured data have enabled several successful applications such as
recommendation systems and traffic prediction, given the rich node features and edges …
recommendation systems and traffic prediction, given the rich node features and edges …
Local, private, efficient protocols for succinct histograms
We give efficient protocols and matching accuracy lower bounds for frequency estimation in
the local model for differential privacy. In this model, individual users randomize their data …
the local model for differential privacy. In this model, individual users randomize their data …
The composition theorem for differential privacy
Interactive querying of a database degrades the privacy level. In this paper we answer the
fundamental question of characterizing the level of privacy degradation as a function of the …
fundamental question of characterizing the level of privacy degradation as a function of the …
Differential private knowledge transfer for privacy-preserving cross-domain recommendation
Cross Domain Recommendation (CDR) has been popularly studied to alleviate the cold-
start and data sparsity problem commonly existed in recommender systems. CDR models …
start and data sparsity problem commonly existed in recommender systems. CDR models …
Extremal mechanisms for local differential privacy
Local differential privacy has recently surfaced as a strong measure of privacy in contexts
where personal information remains private even from data analysts. Working in a setting …
where personal information remains private even from data analysts. Working in a setting …
Generating synthetic decentralized social graphs with local differential privacy
A large amount of valuable information resides in decentralized social graphs, where no
entity has access to the complete graph structure. Instead, each user maintains locally a …
entity has access to the complete graph structure. Instead, each user maintains locally a …
Extremal mechanisms for local differential privacy
Local differential privacy has recently surfaced as a strong measure of privacy in contexts
where personal information remains private even from data analysts. Working in a setting …
where personal information remains private even from data analysts. Working in a setting …
Efficient mean estimation with pure differential privacy via a sum-of-squares exponential mechanism
We give the first polynomial-time algorithm to estimate the mean of ad-variate probability
distribution with bounded covariance from Õ (d) independent samples subject to pure …
distribution with bounded covariance from Õ (d) independent samples subject to pure …