Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of machine and deep learning methods for privacy protection in the Internet of Things
Recent advances in hardware and information technology have accelerated the proliferation
of smart and interconnected devices facilitating the rapid development of the Internet of …
of smart and interconnected devices facilitating the rapid development of the Internet of …
A review of deep learning security and privacy defensive techniques
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …
Privacy-preserving healthcare monitoring for IoT devices under edge computing
W Cao, W Shen, Z Zhang, J Qin - Computers & Security, 2023 - Elsevier
With the rapid development of the Internet of Things (IoT) technology, e-healthcare has
received extensive attention because it is able to provide real-time health status feedback for …
received extensive attention because it is able to provide real-time health status feedback for …
PrivacySignal: Privacy-preserving traffic signal control for intelligent transportation system
A new trend of using deep reinforcement learning for traffic signal control has become a
spotlight in the Intelligent Transportation System (ITS). However, the traditional intelligent …
spotlight in the Intelligent Transportation System (ITS). However, the traditional intelligent …
Privacy-preserving outsourced speech recognition for smart IoT devices
Most of the current intelligent Internet of Things (IoT) products take neural network-based
speech recognition as the standard human–machine interaction interface. However, the …
speech recognition as the standard human–machine interaction interface. However, the …
SecureAD: A secure video anomaly detection framework on convolutional neural network in edge computing environment
Anomaly detection offers a powerful approach to identifying unusual activities and
uncommon behaviors in real-world video scenes. At present, convolutional neural networks …
uncommon behaviors in real-world video scenes. At present, convolutional neural networks …
Data privacy preservation on the internet of things
Recent developments in hardware and information technology have enabled the
emergence of billions of connected, intelligent devices around the world exchanging …
emergence of billions of connected, intelligent devices around the world exchanging …
Privacy-preserving record linkage using local sensitive hash and private set intersection
The amount of data stored in data repositories increases every year. This makes it
challenging to link records between different datasets across companies and even …
challenging to link records between different datasets across companies and even …
Privacy-preserving randomized controlled trials: A protocol for industry scale deployment
Randomized Controlled Trials, when feasible, give the strongest and most trustworthy
empirical measures of causal effects. They are the gold standard in many clinical, social …
empirical measures of causal effects. They are the gold standard in many clinical, social …
Will Central Bank Digital Currencies (CBDC) and Blockchain Cryptocurrencies Coexist in the Post Quantum Era?
This paper explores the coexistence possibilities of Central Bank Digital Currencies
(CBDCs) and blockchain-based cryptocurrencies within a post-quantum computing …
(CBDCs) and blockchain-based cryptocurrencies within a post-quantum computing …