Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Explainable artificial intelligence applications in cyber security: State-of-the-art in research
This survey presents a comprehensive review of current literature on Explainable Artificial
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …
[HTML][HTML] Machine learning for Internet of Things data analysis: A survey
Rapid developments in hardware, software, and communication technologies have
facilitated the emergence of Internet-connected sensory devices that provide observations …
facilitated the emergence of Internet-connected sensory devices that provide observations …
Membership inference attacks from first principles
A membership inference attack allows an adversary to query a trained machine learning
model to predict whether or not a particular example was contained in the model's training …
model to predict whether or not a particular example was contained in the model's training …
Efficient few-shot learning without prompts
Recent few-shot methods, such as parameter-efficient fine-tuning (PEFT) and pattern
exploiting training (PET), have achieved impressive results in label-scarce settings …
exploiting training (PET), have achieved impressive results in label-scarce settings …
Weight poisoning attacks on pre-trained models
Recently, NLP has seen a surge in the usage of large pre-trained models. Users download
weights of models pre-trained on large datasets, then fine-tune the weights on a task of their …
weights of models pre-trained on large datasets, then fine-tune the weights on a task of their …
Data shapley: Equitable valuation of data for machine learning
As data becomes the fuel driving technological and economic growth, a fundamental
challenge is how to quantify the value of data in algorithmic predictions and decisions. For …
challenge is how to quantify the value of data in algorithmic predictions and decisions. For …
Machine unlearning of features and labels
Removing information from a machine learning model is a non-trivial task that requires to
partially revert the training process. This task is unavoidable when sensitive data, such as …
partially revert the training process. This task is unavoidable when sensitive data, such as …
Adversarial attacks on deep-learning models in natural language processing: A survey
With the development of high computational devices, deep neural networks (DNNs), in
recent years, have gained significant popularity in many Artificial Intelligence (AI) …
recent years, have gained significant popularity in many Artificial Intelligence (AI) …
Black-box generation of adversarial text sequences to evade deep learning classifiers
Although various techniques have been proposed to generate adversarial samples for white-
box attacks on text, little attention has been paid to a black-box attack, which is a more …
box attacks on text, little attention has been paid to a black-box attack, which is a more …
Understanding black-box predictions via influence functions
How can we explain the predictions of a black-box model? In this paper, we use influence
functions—a classic technique from robust statistics—to trace a model's prediction through …
functions—a classic technique from robust statistics—to trace a model's prediction through …