Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Block-secure: Blockchain based scheme for secure P2P cloud storage
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …
To tackle with large-scale data, more and more applications choose to enlarge the storage …
A task scheduling algorithm based on classification mining in fog computing environment
L Liu, D Qi, N Zhou, Y Wu - Wireless Communications and …, 2018 - Wiley Online Library
Fog computing (FC) is an emerging paradigm that extends computation, communication,
and storage facilities towards the edge of a network. In this heterogeneous and distributed …
and storage facilities towards the edge of a network. In this heterogeneous and distributed …
Graph embedding‐based intelligent industrial decision for complex sewage treatment processes
Intelligent algorithms‐driven industrial decision systems have been a general demand for
modeling complex sewage treatment processes (STP). Existing researches modeled …
modeling complex sewage treatment processes (STP). Existing researches modeled …
TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain
As a very attractive computing paradigm, cloud computing makes it possible for resource-
constrained users to enjoy cost-effective and flexible resources of diversity. Considering the …
constrained users to enjoy cost-effective and flexible resources of diversity. Considering the …
Public auditing for shared cloud data with efficient and secure group management
With increasing popularity of collaboration in clouds, shared data auditing has become an
important issue in cloud auditing field, and attracted extensive attention from the research …
important issue in cloud auditing field, and attracted extensive attention from the research …
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT
Abstract The Internet of Things (IoT) has become one of critical parts in our daily life. As a
large number of smart things connecting to the Internet, terminals are vulnerable to various …
large number of smart things connecting to the Internet, terminals are vulnerable to various …
A cloud secure storage mechanism based on data dispersion and encryption
H Song, J Li, H Li - IEEE Access, 2021 - ieeexplore.ieee.org
Cloud storage service has shown its great power and wide popularity which provides
fundamental support for rapid development of cloud computing. However, due to …
fundamental support for rapid development of cloud computing. However, due to …
An authenticated asymmetric group key agreement based on attribute encryption
Secure communication among terminals in a group is necessary in Internet of Things (IoT).
Such as, the Vehicular Ad-hoc Network (VANET) is used to communicate with the vehicles to …
Such as, the Vehicular Ad-hoc Network (VANET) is used to communicate with the vehicles to …
A reliability-aware approach for resource efficient virtual network function deployment
J Sun, G Zhu, G Sun, D Liao, Y Li, AK Sangaiah… - IEEE …, 2018 - ieeexplore.ieee.org
Network function virtualization (NFV) is a promising technique aimed at reducing capital
expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and …
expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and …
Centralized duplicate removal video storage system with privacy preservation in IoT
In recent years, the Internet of Things (IoT) has found wide application and attracted much
attention. Since most of the end-terminals in IoT have limited capabilities for storage and …
attention. Since most of the end-terminals in IoT have limited capabilities for storage and …