Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges
Measuring and evaluating source code similarity is a fundamental software engineering
activity that embraces a broad range of applications, including but not limited to code …
activity that embraces a broad range of applications, including but not limited to code …
Rebooting research on detecting repackaged android apps: Literature review and benchmark
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of
their benefits, contributes to spreading malware on users' devices, and increases the …
their benefits, contributes to spreading malware on users' devices, and increases the …
An effective end-to-end android malware detection method
H Zhu, H Wei, L Wang, Z Xu, VS Sheng - Expert Systems with Applications, 2023 - Elsevier
Android has rapidly become the most popular mobile operating system because of its open
source, rich hardware selectivity, and millions of applications (Apps). Meanwhile, the open …
source, rich hardware selectivity, and millions of applications (Apps). Meanwhile, the open …
GHGDroid: Global heterogeneous graph-based android malware detection
L Shen, M Fang, J Xu - Computers & Security, 2024 - Elsevier
As the most popular mobile platform, Android has become the major attack target of
malware, and thus there is an urgent need to effectively thwart them. Recently, the graph …
malware, and thus there is an urgent need to effectively thwart them. Recently, the graph …
Graph embedding based familial analysis of android malware using unsupervised learning
The rapid growth of Android malware has posed severe security threats to smartphone
users. On the basis of the familial trait of Android malware observed by previous work, the …
users. On the basis of the familial trait of Android malware observed by previous work, the …
Comparison and evaluation of clone detection techniques with different code representations
Y Wang, Y Ye, Y Wu, W Zhang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
As one of bad smells in code, code clones may increase the cost of software maintenance
and the risk of vulnerability propagation. In the past two decades, numerous clone detection …
and the risk of vulnerability propagation. In the past two decades, numerous clone detection …
Malware-on-the-brain: Illuminating malware byte codes with images for malware classification
Malware is a piece of software that was written with the intent of doing harm to data, devices,
or people. Since a number of new malware variants can be generated by reusing codes …
or people. Since a number of new malware variants can be generated by reusing codes …
Detection of evasive Android malware using EigenGCN
Recently there is an upsurge in Android malware that use obfuscation and repackaging
techniques for evasion. Malware may also combine both these techniques to create stealthy …
techniques for evasion. Malware may also combine both these techniques to create stealthy …
Ctdroid: leveraging a corpus of technical blogs for android malware analysis
The rapid growth of Android malware results in a large body of approaches devoted to
malware analysis by leveraging machine learning algorithms. However, the effectiveness of …
malware analysis by leveraging machine learning algorithms. However, the effectiveness of …
Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding
With the widespread use of smartphones, Android malware has posed serious threats to its
security. Given the explosive growth of Android malware variants, detecting malware …
security. Given the explosive growth of Android malware variants, detecting malware …