Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Generative adversarial nets for unsupervised outlier detection
X Du, J Chen, J Yu, S Li, Q Tan - Expert Systems with Applications, 2024 - Elsevier
Outlier detection, also known as anomaly detection, has been a persistent and active
research area for decades due to its wide range of applications in various fields. Many well …
research area for decades due to its wide range of applications in various fields. Many well …
Multi-view social recommendation via matrix factorization with sub-linear convergence rate
Abstract Recently Recommender Systems (RS) have become crucial tools to deal with
information retrieval and filtering in various applications, such as online business, social …
information retrieval and filtering in various applications, such as online business, social …
How big five personality traits influence information sharing on social media: A meta analysis
H Lin, C Wang, Y Sun - PloS One, 2024 - journals.plos.org
Research interest in information sharing behavior on social media has significantly
increased over the past decade. However, empirical studies on the relationship between Big …
increased over the past decade. However, empirical studies on the relationship between Big …
MMBERT: a unified framework for biomedical named entity recognition
L Fu, Z Weng, J Zhang, H ** clustering for the identification of the subject matter of legal judgments
The legal field is generally burdened by paper-heavy activities, and the management of
massive amounts of legal judgments without the adoption of computational tools may …
massive amounts of legal judgments without the adoption of computational tools may …
Cloaked classifiers: Pseudonymization strategies on sensitive classification tasks
A Riabi, M Mahamdi, V Mouilleron… - arxiv preprint arxiv …, 2024 - arxiv.org
Protecting privacy is essential when sharing data, particularly in the case of an online
radicalization dataset that may contain personal information. In this paper, we explore the …
radicalization dataset that may contain personal information. In this paper, we explore the …
NLP-based approach for automated safety requirements information retrieval from project documents
Z Wu, G Ma - Expert Systems with Applications, 2024 - Elsevier
Numerous project documents generated during the construction phase pertain to the actual
safety requirements (SRs) specified by project managers (PMs), and these concealed …
safety requirements (SRs) specified by project managers (PMs), and these concealed …
Beyond Dataset Creation: Critical View of Annotation Variation and Bias Probing of a Dataset for Online Radical Content Detection
The proliferation of radical content on online platforms poses significant risks, including
inciting violence and spreading extremist ideologies. Despite ongoing research, existing …
inciting violence and spreading extremist ideologies. Despite ongoing research, existing …
Integrating Neighborhood Geographic Distribution and Social Structure Influence for Social Media User Geolocation.
M Zhang, X Luo, N Huang - CMES-Computer Modeling in …, 2024 - search.ebscohost.com
Geolocating social media users aims to discover the real geographical locations of users
from their publicly available data, which can support online location-based applications such …
from their publicly available data, which can support online location-based applications such …