Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on social spam detection: Challenges, open issues, and future directions
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …
applications such as content sharing, chatting, making friends/followers, customer …
Machine learning-based social media bot detection: a comprehensive literature review
In today's digitalized era, Online Social Networking platforms are growing to be a vital aspect
of each individual's daily life. The availability of the vast amount of information and their …
of each individual's daily life. The availability of the vast amount of information and their …
A high-quality feature selection method based on frequent and correlated items for text classification
H Mamdouh Farghaly, T Abd El-Hafeez - Soft Computing, 2023 - Springer
The feature selection problem is a significant challenge in pattern recognition, especially for
classification tasks. The quality of the selected features plays a critical role in building …
classification tasks. The quality of the selected features plays a critical role in building …
A survey on classification techniques for opinion mining and sentiment analysis
Opinion mining is considered as a subfield of natural language processing, information
retrieval and text mining. Opinion mining is the process of extracting human thoughts and …
retrieval and text mining. Opinion mining is the process of extracting human thoughts and …
Artificial intelligence in the cyber domain: Offense and defense
Artificial intelligence techniques have grown rapidly in recent years, and their applications in
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …
Wrapper-based optimized feature selection using nature-inspired algorithms
N Karlupia, P Abrol - Neural Computing and Applications, 2023 - Springer
Computations that mimic nature are known as nature-inspired computing. Nature presents a
wealthy source of thoughts and ideas for computing. The use of natural galvanized …
wealthy source of thoughts and ideas for computing. The use of natural galvanized …
An efficient hybrid system for anomaly detection in social networks
Anomaly detection has been an essential and dynamic research area in the data mining. A
wide range of applications including different social medias have adopted different state-of …
wide range of applications including different social medias have adopted different state-of …
Spam detection on social networks using cost-sensitive feature selection and ensemble-based regularized deep neural networks
A Barushka, P Hajek - Neural Computing and Applications, 2020 - Springer
Spam detection on social networks is increasingly important owing to the rapid growth of
social network user base. Sophisticated spam filters must be developed to deal with this …
social network user base. Sophisticated spam filters must be developed to deal with this …
DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning
P Wanda, HJ Jie - Social Network Analysis and Mining, 2021 - Springer
Abstract Detection of Online Social Networks (OSN) anomalous nodes becomes
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …
A comprehensive survey of social engineering attacks: Taxonomy of attacks, prevention, and mitigation strategies
Social engineering attacks pose a significant threat to individuals, organizations, and
governments globally. These attacks leverage human psychology, manipulating individuals …
governments globally. These attacks leverage human psychology, manipulating individuals …