Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Frequent pattern mining: current status and future directions
Frequent pattern mining has been a focused theme in data mining research for over a
decade. Abundant literature has been dedicated to this research and tremendous progress …
decade. Abundant literature has been dedicated to this research and tremendous progress …
Spectrum-based software fault localization: A survey of techniques, advances, and challenges
Despite being one of the most basic tasks in software development, debugging is still
performed in a mostly manual way, leading to high cost and low performance. To address …
performed in a mostly manual way, leading to high cost and low performance. To address …
Unicorn: Runtime provenance-based detector for advanced persistent threats
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
Graph based anomaly detection and description: a survey
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …
such as security, finance, health care, and law enforcement. While numerous techniques …
Frequent pattern mining algorithms: A survey
This chapter will provide a detailed survey of frequent pattern mining algorithms. A wide
variety of algorithms will be covered starting from Apriori. Many algorithms such as Eclat …
variety of algorithms will be covered starting from Apriori. Many algorithms such as Eclat …
A survey on software fault localization
Software fault localization, the act of identifying the locations of faults in a program, is widely
recognized to be one of the most tedious, time consuming, and expensive-yet equally critical …
recognized to be one of the most tedious, time consuming, and expensive-yet equally critical …
Fast memory-efficient anomaly detection in streaming heterogeneous graphs
Given a stream of heterogeneous graphs containing different types of nodes and edges,
how can we spot anomalous ones in real-time while consuming bounded memory? This …
how can we spot anomalous ones in real-time while consuming bounded memory? This …
Oddball: Spotting anomalies in weighted graphs
Given a large, weighted graph, how can we find anomalies? Which rules should be violated,
before we label a node as an anomaly? We propose the oddball algorithm, to find such …
before we label a node as an anomaly? We propose the oddball algorithm, to find such …
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software
plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open …
plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open …
Graph-based root cause analysis for service-oriented and microservice architectures
Abstract Service-oriented architectures and microservices define two ways of designing
software with the aim of dividing an application into loosely-coupled services that …
software with the aim of dividing an application into loosely-coupled services that …