Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A dummy-based user privacy protection approach for text information retrieval
Z Wu, S Shen, X Lian, X Su, E Chen - Knowledge-Based Systems, 2020 - Elsevier
Text retrieval enables people to efficiently obtain the desired data from massive text data, so
has become one of the most popular services in information retrieval community. However …
has become one of the most popular services in information retrieval community. However …
Privacy-and utility-preserving textual analysis via calibrated multivariate perturbations
Accurately learning from user data while providing quantifiable privacy guarantees provides
an opportunity to build better ML models while maintaining user trust. This paper presents a …
an opportunity to build better ML models while maintaining user trust. This paper presents a …
A differentially private text perturbation method using a regularized mahalanobis metric
Balancing the privacy-utility tradeoff is a crucial requirement of many practical machine
learning systems that deal with sensitive customer data. A popular approach for privacy …
learning systems that deal with sensitive customer data. A popular approach for privacy …
Modular order-preserving encryption, revisited
Order-preserving encryption (OPE) schemes, whose ciphertexts preserve the natural
ordering of the plaintexts, allow efficient range query processing over outsourced encrypted …
ordering of the plaintexts, allow efficient range query processing over outsourced encrypted …
Privacy preservation by disassociation
In this work, we focus on protection against identity disclosure in the publication of sparse
multidimensional data. Existing multidimensional anonymization techniquesa) protect the …
multidimensional data. Existing multidimensional anonymization techniquesa) protect the …
An efficient approach for cross-silo federated learning to rank
Traditional learning-to-rank (LTR) models are usually trained in a centralized approach
based upon a large amount of data. However, with the increasing awareness of data …
based upon a large amount of data. However, with the increasing awareness of data …
On a utilitarian approach to privacy preserving text generation
Differentially-private mechanisms for text generation typically add carefully calibrated noise
to input words and use the nearest neighbor to the noised input as the output word. When …
to input words and use the nearest neighbor to the noised input as the output word. When …
Covering the sensitive subjects to protect personal privacy in personalized recommendation
Personalized recommendation has demonstrated its effectiveness in improving the problem
of information overload on the Internet. However, evidences show that due to the concerns …
of information overload on the Internet. However, evidences show that due to the concerns …
A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment
Z Wu, S Shen, H Li, H Zhou, D Zou - Library Hi Tech, 2021 - emerald.com
Purpose First, the authors analyze the key problems faced by the protection of digital library
readers' data privacy and behavior privacy. Second, the authors introduce the characteristics …
readers' data privacy and behavior privacy. Second, the authors introduce the characteristics …
Personalization vs. privacy in big data analysis
Personalization is the process of adapting the output of a system to a user's context and
profile. User information such as geographical location, academic and professional …
profile. User information such as geographical location, academic and professional …