Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security services using blockchains: A state of the art survey
This paper surveys blockchain-based approaches for several security services. These
services include authentication, confidentiality, privacy and access control list, data and …
services include authentication, confidentiality, privacy and access control list, data and …
[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …
Orchestra: Unsupervised federated learning via globally consistent clustering
Federated learning is generally used in tasks where labels are readily available (eg, next
word prediction). Relaxing this constraint requires design of unsupervised learning …
word prediction). Relaxing this constraint requires design of unsupervised learning …
Big data security and privacy
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …
make today possible to collect huge amounts of data. However, for data to be used to their …
Never walk alone: Uncertainty for anonymity in moving objects databases
Preserving individual privacy when publishing data is a problem that is receiving increasing
attention. According to the fc-anonymity principle, each release of data must be such that …
attention. According to the fc-anonymity principle, each release of data must be such that …
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
This paper aims at answering the following two questions in privacy-preserving data
analysis and publishing. The first is: What formal privacy guarantee (if any) does k …
analysis and publishing. The first is: What formal privacy guarantee (if any) does k …
A review of anonymization for healthcare data
Mining health data can lead to faster medical decisions, improvement in the quality of
treatment, disease prevention, and reduced cost, and it drives innovative solutions within the …
treatment, disease prevention, and reduced cost, and it drives innovative solutions within the …
Towards trajectory anonymization: a generalization-based approach
Trajectory datasets are becoming more and more popular due to the massive usage of GPS
and other location-based devices and services. In this paper, we address privacy issues …
and other location-based devices and services. In this paper, we address privacy issues …
A Clustering Approach for the l‐Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus‐Bacterial Foraging Optimization Algorithm
In privacy preserving data mining, the l‐diversity and k‐anonymity models are the most
widely used for preserving the sensitive private information of an individual. Out of these two …
widely used for preserving the sensitive private information of an individual. Out of these two …
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely
continue. What naive technology users may not realize is that the information they provide …
continue. What naive technology users may not realize is that the information they provide …