Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT
Along with the rapid development of cloud computing, IoT, and AI technologies, cloud video
surveillance (CVS) has become a hotly discussed topic, especially when facing the …
surveillance (CVS) has become a hotly discussed topic, especially when facing the …
CHAT-Bot: A cultural heritage aware teller-bot for supporting touristic experiences
Cultural heritage is an important resource that allows us to know and promote a territory. In
this respect, it is important to experiment with the enhancement of cultural heritage by …
this respect, it is important to experiment with the enhancement of cultural heritage by …
A context-aware chatbot for tourist destinations
The cultural heritage is one of the most important resources of the territory. It represents one
of the scenarios where new technologies can provide more interesting contributions. In …
of the scenarios where new technologies can provide more interesting contributions. In …
One-pass lossless data hiding and compression of remote sensing data
The information obtained by means of spectral remote sensing (ie, the hyperspectral
images) are involved in several real-life scenarios and applications. Historical research …
images) are involved in several real-life scenarios and applications. Historical research …
Efficient compression and encryption for digital data transmission
B Carpentieri - Security and Communication Networks, 2018 - Wiley Online Library
We live in a digital era in which communication is largely based on the exchange of digital
information on data networks. Communication is often pictured as a sender that transmits a …
information on data networks. Communication is often pictured as a sender that transmits a …
On the protection of consumer genomic data in the Internet of Living Things
Several companies have recently emerged to provide online Direct-To-Consumer (DTC)
DNA analysis and sequencing. Those activities will be, in the near future, the foundations of …
DNA analysis and sequencing. Those activities will be, in the near future, the foundations of …
Protection of microscopy images through digital watermarking techniques
Nowadays microscopy confocal images are becoming more and more a fundamental tool for
many application fields, including biology, forensic analysis, medicine, industrial research …
many application fields, including biology, forensic analysis, medicine, industrial research …
[HTML][HTML] An effective grou** method for privacy-preserving bike sharing data publishing
ASMT Hasan, Q Jiang, C Li - Future Internet, 2017 - mdpi.com
Bike sharing programs are eco-friendly transportation systems that are widespread in smart
city environments. In this paper, we study the problem of privacy-preserving bike sharing …
city environments. In this paper, we study the problem of privacy-preserving bike sharing …
Compression‐based steganography
Conventional privacy‐enforcement mechanisms, such as encryption‐based ones, are
frequently used to prevent third‐party eavesdroppers to intercept confidential information …
frequently used to prevent third‐party eavesdroppers to intercept confidential information …
Energy-efficient relay tracking with multiple mobile camera sensors
Abstract Camera Sensor Networks (CSNs) has been deployed for many applications of
video surveillance. In urban road or large buildings, camera sensors are deployed in public …
video surveillance. In urban road or large buildings, camera sensors are deployed in public …