Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
GAN-based anomaly detection: A review
X **a, X Pan, N Li, X He, L Ma, X Zhang, N Ding - Neurocomputing, 2022 - Elsevier
Supervised learning algorithms have shown limited use in the field of anomaly detection due
to the unpredictability and difficulty in acquiring abnormal samples. In recent years …
to the unpredictability and difficulty in acquiring abnormal samples. In recent years …
A unifying review of deep and shallow anomaly detection
Deep learning approaches to anomaly detection (AD) have recently improved the state of
the art in detection performance on complex data sets, such as large collections of images or …
the art in detection performance on complex data sets, such as large collections of images or …
A survey of machine unlearning
Today, computer systems hold large amounts of personal data. Yet while such an
abundance of data allows breakthroughs in artificial intelligence, and especially machine …
abundance of data allows breakthroughs in artificial intelligence, and especially machine …
Remember what you want to forget: Algorithms for machine unlearning
We study the problem of unlearning datapoints from a learnt model. The learner first
receives a dataset $ S $ drawn iid from an unknown distribution, and outputs a model …
receives a dataset $ S $ drawn iid from an unknown distribution, and outputs a model …
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
Federated unlearning: How to efficiently erase a client in fl?
With privacy legislation empowering the users with the right to be forgotten, it has become
essential to make a model amenable for forgetting some of its training data. However …
essential to make a model amenable for forgetting some of its training data. However …
A comprehensive survey of forgetting in deep learning beyond continual learning
Z Wang, E Yang, L Shen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Forgetting refers to the loss or deterioration of previously acquired knowledge. While
existing surveys on forgetting have primarily focused on continual learning, forgetting is a …
existing surveys on forgetting have primarily focused on continual learning, forgetting is a …
Realtime robust malicious traffic detection via frequency domain analysis
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …
particularly for zero-day attack detection, which is complementary to existing rule based …
A survey on automated log analysis for reliability engineering
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …
recent decades, software logs have become imperative in the reliability assurance …
Host-based IDS: A review and open issues of an anomaly detection system in IoT
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …
and heterogeneity where ensuring reliable services and communications across multiple …