Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Identifying authorship in malicious binaries: Features, challenges & datasets
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
Authorship attribution methods, challenges, and future research directions: A comprehensive survey
Over the past few decades, researchers have put their effort and paid significant attention to
the authorship attribution field, as it plays an important role in software forensics analysis …
the authorship attribution field, as it plays an important role in software forensics analysis …
Authorship identification using ensemble learning
With time, textual data is proliferating, primarily through the publications of articles. With this
rapid increase in textual data, anonymous content is also increasing. Researchers are …
rapid increase in textual data, anonymous content is also increasing. Researchers are …
Misleading authorship attribution of source code using adversarial learning
In this paper, we present a novel attack against authorship attribution of source code. We
exploit that recent attribution methods rest on machine learning and thus can be deceived by …
exploit that recent attribution methods rest on machine learning and thus can be deceived by …
Large-scale and language-oblivious code authorship identification
Efficient extraction of code authorship attributes is key for successful identification. However,
the extraction of such attributes is very challenging, due to various programming language …
the extraction of such attributes is very challenging, due to various programming language …
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …
including plagiarism detection, software license violation detection, and vulnerability …
Machine learning-based analysis of program binaries: A comprehensive study
Binary code analysis is crucial in various software engineering tasks, such as malware
detection, code refactoring, and plagiarism detection. With the rapid growth of software …
detection, code refactoring, and plagiarism detection. With the rapid growth of software …
A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …
Ransomware detection and classification strategies
Ransomware uses encryption methods to make data inaccessible to legitimate users. To
date a wide range of ransomware families have been developed and deployed, causing …
date a wide range of ransomware families have been developed and deployed, causing …
Code authorship identification using convolutional neural networks
Although source code authorship identification creates a privacy threat for many open
source contributors, it is an important topic for the forensics field and enables many …
source contributors, it is an important topic for the forensics field and enables many …