Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on social spam detection: Challenges, open issues, and future directions
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …
applications such as content sharing, chatting, making friends/followers, customer …
A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
Software vulnerability detection using deep neural networks: a survey
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …
important concern in the software industry and in the field of cybersecurity, suggesting that …
A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks
Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …
Twitter and research: A systematic literature review through text mining
Researchers have collected Twitter data to study a wide range of topics. This growing body
of literature, however, has not yet been reviewed systematically to synthesize Twitter-related …
of literature, however, has not yet been reviewed systematically to synthesize Twitter-related …
A total error framework for digital traces of human behavior on online platforms
People's activities and opinions recorded as digital traces online, especially on social media
and other web-based platforms, offer increasingly informative pictures of the public. They …
and other web-based platforms, offer increasingly informative pictures of the public. They …
A neural network-based ensemble approach for spam detection in Twitter
As the social networking sites get more popular, spammers target these sites to spread
spam posts. Twitter is one of the most popular online social networking sites where users …
spam posts. Twitter is one of the most popular online social networking sites where users …
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection
Software vulnerability has long been an important but critical research issue in
cybersecurity. Recently, the machine learning (ML)-based approach has attracted …
cybersecurity. Recently, the machine learning (ML)-based approach has attracted …
Learning textual features for Twitter spam detection: A systematic literature review
Background—Nowadays, with the rise of Internet access and mobile devices around the
globe, more people are using social networks for collaboration and receiving real-time …
globe, more people are using social networks for collaboration and receiving real-time …
Data-driven cyber security in perspective—Intelligent traffic analysis
Social and Internet traffic analysis is fundamental in detecting and defending cyber attacks.
Traditional approaches resorting to manually defined rules are gradually replaced by …
Traditional approaches resorting to manually defined rules are gradually replaced by …