Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A brief survey of visual saliency detection
Salient object detection models mimic the behavior of human beings and capture the most
salient region/object from the images or scenes, this field contains many important …
salient region/object from the images or scenes, this field contains many important …
A review on near-duplicate detection of images using computer vision techniques
Nowadays, digital content is widespread and simply redistributable, either lawfully or
unlawfully. For example, after images are posted on the internet, other web users can modify …
unlawfully. For example, after images are posted on the internet, other web users can modify …
Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection
The proliferation of social media in communication and information dissemination has made
it an ideal platform for spreading rumors. Automatically debunking rumors at their stage of …
it an ideal platform for spreading rumors. Automatically debunking rumors at their stage of …
Map** of urban surface water bodies from Sentinel-2 MSI imagery at 10 m resolution via NDWI-based image sharpening
This study conducts an exploratory evaluation of the performance of the newly available
Sentinel-2A Multispectral Instrument (MSI) imagery for map** water bodies using the …
Sentinel-2A Multispectral Instrument (MSI) imagery for map** water bodies using the …
Improving metaheuristic algorithms with information feedback models
In most metaheuristic algorithms, the updating process fails to make use of information
available from individuals in previous iterations. If this useful information could be exploited …
available from individuals in previous iterations. If this useful information could be exploited …
A secured distributed detection system based on IPFS and blockchain for industrial image and video data security
Copyright infringement adversely affects the interest of copyright holders of images and
videos which are uploaded to different websites and peer-to-peer image sharing systems …
videos which are uploaded to different websites and peer-to-peer image sharing systems …
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
The content-based image retrieval (CBIR) has been widely studied along with the increasing
importance of images in our daily life. Compared with the text documents, images consume …
importance of images in our daily life. Compared with the text documents, images consume …
A survey on image tampering and its detection in real-world photos
Editing a real-world photo through computer software or mobile applications is one of the
easiest things one can do today before sharing the doctored image on one's social …
easiest things one can do today before sharing the doctored image on one's social …
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment
With the increasing popularity of service computing paradigm, tremendous resources or
services are emerging rapidly on the Web, imposing heavy burdens on the service selection …
services are emerging rapidly on the Web, imposing heavy burdens on the service selection …
[PDF][PDF] A Fusion Steganographic Algorithm Based on Faster R-CNN.
The aim of information hiding is to embed the secret message in a normal cover media such
as image, video, voice or text, and then the secret message is transmitted through the …
as image, video, voice or text, and then the secret message is transmitted through the …