Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
Source detection of rumor in social network–a review
The ubiquity of handheld devices provides straightforward access to the Internet and Social
networking. The quick and easy updates from social networks help users in many situations …
networking. The quick and easy updates from social networks help users in many situations …
Software vulnerability detection using deep neural networks: a survey
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …
important concern in the software industry and in the field of cybersecurity, suggesting that …
A rapid source localization method in the early stage of large-scale network propagation
Recently, the rapid diffusion of malicious information in online social networks causes great
harm to our society. Therefore, it is of great significance to localize diffusion sources as early …
harm to our society. Therefore, it is of great significance to localize diffusion sources as early …
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis
To improve the flow of quality information and combat fake news on social media, it is
essential to identify the origins and evolution patterns of false information. However …
essential to identify the origins and evolution patterns of false information. However …
A survey on security issues in services communication of Microservices‐enabled fog applications
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …
applications. To incorporate various design choices and customized policies in fog …
Multiple rumor source detection with graph convolutional networks
Detecting rumor source in social networks is one of the key issues for defeating rumors
automatically. Although many efforts have been devoted to defeating online rumors, most of …
automatically. Although many efforts have been devoted to defeating online rumors, most of …
Locating multi-sources in social networks with a low infection rate
P Zhu, L Cheng, C Gao, Z Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of modern technology, numerous economic losses are incurred by
various spreading phenomena. Thus, it is of great significance to identify the initial sources …
various spreading phenomena. Thus, it is of great significance to identify the initial sources …
Source localization of graph diffusion via variational autoencoders for graph inverse problems
Graph diffusion problems such as the propagation of rumors, computer viruses, or smart grid
failures are ubiquitous and societal. Hence it is usually crucial to identify diffusion sources …
failures are ubiquitous and societal. Hence it is usually crucial to identify diffusion sources …
Countering misinformation: A multidisciplinary approach
The article explores the concept of infodemics during the COVID-19 pandemic, focusing on
the propagation of false or inaccurate information proliferating worldwide throughout the …
the propagation of false or inaccurate information proliferating worldwide throughout the …