Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A trajectory privacy-preserving scheme based on transition matrix and caching for IIoT
With the increasing integration of location-based services (LBSs) into various societal
domains, location privacy preservation has emerged as a pivotal concern. In most …
domains, location privacy preservation has emerged as a pivotal concern. In most …
Achieving privacy-preserving trajectory query in geospatial information systems with outsourced cloud
Geographic information system (GIS) enables operations for capturing, manipulating,
analyzing, and displaying the spatial characteristics of objects on Earth's surface. As the …
analyzing, and displaying the spatial characteristics of objects on Earth's surface. As the …
Achieving efficient and privacy-preserving location-based task recommendation in spatial crowdsourcing
In spatial crowdsourcing, location-based task recommendation schemes are widely used to
match appropriate workers in desired geographic areas with relevant tasks from data …
match appropriate workers in desired geographic areas with relevant tasks from data …
Towards efficient privacy-preserving top-k trajectory similarity query
Similarity search for trajectories, especially the top-k similarity query, has been widely used
in different fields, such as personalized travel route recommendation, car pooling, etc …
in different fields, such as personalized travel route recommendation, car pooling, etc …
Efficient and Privacy-Preserving Encode-Based Range Query over Encrypted Cloud Data
Y Liang, J Ma, Y Miao, Y Su… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Privacy-preserving range query, which allows the server to implement secure and efficient
range query on encrypted data, has been widely studied in recent years. Existing privacy …
range query on encrypted data, has been widely studied in recent years. Existing privacy …
Towards Secure Trajectory Similarity Range Query under Multi-User Setting
N Cui, X Sun, L Pei, M Wang, D Wang… - IEEE Internet of …, 2025 - ieeexplore.ieee.org
The widespread availability of similarity queries over trajectory data has led to numerous
real-world applications, such as traffic management and path planning. With the proliferation …
real-world applications, such as traffic management and path planning. With the proliferation …
Efficient and privacy-preserving spatial-feature-based reverse kNN query
Reverse k nearest neighbor (RkNN) query has been widely applied in the targeted push of
information. Many schemes for the RkNN query on encrypted data have been proposed for …
information. Many schemes for the RkNN query on encrypted data have been proposed for …
Privacy Protection Framework against Unauthorized Sensing in the 5.8 GHz ISM Band
Unauthorized sensing activities pose an increasing threat to individual privacy, particularly
in the industrial, scientific, and medical (ISM) band where regulatory frameworks remain …
in the industrial, scientific, and medical (ISM) band where regulatory frameworks remain …
Efficient Privacy-Preserving Multi-Location Task Allocation in Fog-Assisted Vehicular Crowdsourcing
Multi-location task allocation is one of the most crucial issues in vehicular crowdsourcing
(VCS). To ensure service quality, the VCS service provider prefers to assign multi-location …
(VCS). To ensure service quality, the VCS service provider prefers to assign multi-location …