Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Differential privacy techniques for cyber physical systems: A survey
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …
development of information and communication technologies (ICT). With the provision of …
Privacy-preserving data publishing: A survey of recent developments
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …
created tremendous opportunities for knowledge-and information-based decision making …
Differentially private aggregation of distributed time-series with transformation and encryption
V Rastogi, S Nath - Proceedings of the 2010 ACM SIGMOD International …, 2010 - dl.acm.org
We propose the first differentially private aggregation algorithm for distributed time-series
data that offers good practical utility without any trusted server. This addresses two important …
data that offers good practical utility without any trusted server. This addresses two important …
Smart meter privacy: A theoretical framework
The solutions offered to-date for end-user privacy in smart meter measurements, a well-
known challenge in the smart grid, have been tied to specific technologies such as batteries …
known challenge in the smart grid, have been tied to specific technologies such as batteries …
[CARTE][B] Introduction to privacy-preserving data publishing: Concepts and techniques
Gaining access to high-quality data is a vital necessity in knowledge-based decision
making. But data in its raw form often contains sensitive information about individuals …
making. But data in its raw form often contains sensitive information about individuals …
Privacy preservation in the publication of trajectories
We study the problem of protecting privacy in the publication of location sequences.
Consider a database of trajectories, corresponding to movements of people, captured by …
Consider a database of trajectories, corresponding to movements of people, captured by …
Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey
The rapid evolution of the Internet of Things (IoT) paradigm during the last decade has lead
to its adoption in critical infrastructure. However, the multitude of benefits that are derived …
to its adoption in critical infrastructure. However, the multitude of benefits that are derived …
An adaptive approach to real-time aggregate monitoring with differential privacy
Sharing real-time aggregate statistics of private data is of great value to the public to perform
data mining for understanding important phenomena, such as Influenza outbreaks and traffic …
data mining for understanding important phenomena, such as Influenza outbreaks and traffic …
Smart meter privacy: A utility-privacy framework
End-user privacy in smart meter measurements is a well-known challenge in the smart grid.
The solutions offered thus far have been tied to specific technologies such as batteries or …
The solutions offered thus far have been tied to specific technologies such as batteries or …
Practical data prediction for real-world wireless sensor networks
Data prediction is proposed in wireless sensor networks (WSNs) to extend the system
lifetime by enabling the sink to determine the data sampled, within some accuracy bounds …
lifetime by enabling the sink to determine the data sampled, within some accuracy bounds …