Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy challenges of large language models: A survey
Large language models (LLMs) have demonstrated extraordinary capabilities and
contributed to multiple fields, such as generating and summarizing text, language …
contributed to multiple fields, such as generating and summarizing text, language …
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models
Machine learning (ML) has become a core component of many real-world applications and
training data is a key factor that drives current progress. This huge success has led Internet …
training data is a key factor that drives current progress. This huge success has led Internet …
{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
Beyond surveillance: privacy, ethics, and regulations in face recognition technology
Facial recognition technology (FRT) has emerged as a powerful tool for public governance
and security, but its rapid adoption has also raised significant concerns about privacy, civil …
and security, but its rapid adoption has also raised significant concerns about privacy, civil …
Dimensions of artificial intelligence anxiety based on the integrated fear acquisition theory
J Li, JS Huang - Technology in Society, 2020 - Elsevier
With the rapid development of artificial intelligence (AI), AI anxiety has emerged and is
receiving widespread attention, but research on this topic is not comprehensive. Therefore …
receiving widespread attention, but research on this topic is not comprehensive. Therefore …
Chameleon: A hybrid secure computation framework for machine learning applications
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …
[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …
their private inputs without revealing anything but the function's output. Generic secure …
Machine learning classification over encrypted data
Abstract Machine learning classification is used in numerous settings nowadays, such as
medical or genomics predictions, spam detection, face recognition, and financial predictions …
medical or genomics predictions, spam detection, face recognition, and financial predictions …
Privacy-preserving outsourced classification in cloud computing
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …