Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Artificial intelligence in the cyber domain: Offense and defense
Artificial intelligence techniques have grown rapidly in recent years, and their applications in
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …
Recasting self-attention with holographic reduced representations
In recent years, self-attention has become the dominant paradigm for sequence modeling in
a variety of domains. However, in domains with very long sequence lengths the $\mathcal …
a variety of domains. However, in domains with very long sequence lengths the $\mathcal …
AlcoR: alignment-free simulation, map**, and visualization of low-complexity regions in biological data
Background Low-complexity data analysis is the area that addresses the search and
quantification of regions in sequences of elements that contain low-complexity or repetitive …
quantification of regions in sequences of elements that contain low-complexity or repetitive …
A review of the emotion recognition model of robots
M Zhao, L Gong, AS Din - Applied Intelligence, 2025 - Springer
Being able to experience emotions is a defining characteristic of machine intelligence, and
the first step in giving robots emotions is to enable them to accurately recognize and …
the first step in giving robots emotions is to enable them to accurately recognize and …
[HTML][HTML] A compression-based method for detecting anomalies in textual data
Nowadays, information and communications technology systems are fundamental assets of
our social and economical model, and thus they should be properly protected against the …
our social and economical model, and thus they should be properly protected against the …
Skynet: a cyber-aware intrusion tolerant overseer
The increasing level of sophistication of cyber attacks which are employing cross-cutting
strategies that leverage multi-domain attack surfaces, including but not limited to, software …
strategies that leverage multi-domain attack surfaces, including but not limited to, software …
Faster classification using compression analytics
C Ting, N Johnson, U Onunkwo… - … Conference on Data …, 2021 - ieeexplore.ieee.org
Compression analytics have gained recent interest for application in malware classification
and digital forensics. This interest is due to the fact that compression analytics rely on …
and digital forensics. This interest is due to the fact that compression analytics rely on …
Neural Normalized Compression Distance and the Disconnect Between Compression and Classification
It is generally well understood that predictive classification and compression are intrinsically
related concepts in information theory. Indeed, many deep learning methods are explained …
related concepts in information theory. Indeed, many deep learning methods are explained …
A Complexity-Informed Approach to Optimise Cyber Defences
L Alevizos - arxiv preprint arxiv:2501.15578, 2025 - arxiv.org
This paper introduces a novel complexity-informed approach to cybersecurity management,
addressing the challenges found within complex cyber defences. We adapt and extend the …
addressing the challenges found within complex cyber defences. We adapt and extend the …
[HTML][HTML] Anomaly detection for individual sequences with applications in identifying malicious tools
Anomaly detection refers to the problem of identifying abnormal behaviour within a set of
measurements. In many cases, one has some statistical model for normal data, and wishes …
measurements. In many cases, one has some statistical model for normal data, and wishes …