Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep learning serves traffic safety analysis: A forward‐looking review
This paper explores deep learning (DL) methods that are used or have the potential to be
used for traffic video analysis, emphasising driving safety for both autonomous vehicles and …
used for traffic video analysis, emphasising driving safety for both autonomous vehicles and …
Machine unlearning: A comprehensive survey
As the right to be forgotten has been legislated worldwide, many studies attempt to design
unlearning mechanisms to protect users' privacy when they want to leave machine learning …
unlearning mechanisms to protect users' privacy when they want to leave machine learning …
A survey of machine unlearning
Today, computer systems hold large amounts of personal data. Yet while such an
abundance of data allows breakthroughs in artificial intelligence, and especially machine …
abundance of data allows breakthroughs in artificial intelligence, and especially machine …
Raising the cost of malicious ai-powered image editing
We present an approach to mitigating the risks of malicious image editing posed by large
diffusion models. The key idea is to immunize images so as to make them resistant to …
diffusion models. The key idea is to immunize images so as to make them resistant to …
Trustworthy ai: A computational perspective
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …
developments, changing everyone's daily life and profoundly altering the course of human …
Fast yet effective machine unlearning
Unlearning the data observed during the training of a machine learning (ML) model is an
important task that can play a pivotal role in fortifying the privacy and security of ML-based …
important task that can play a pivotal role in fortifying the privacy and security of ML-based …
Domain watermark: Effective and harmless dataset copyright protection is closed at hand
The prosperity of deep neural networks (DNNs) is largely benefited from open-source
datasets, based on which users can evaluate and improve their methods. In this paper, we …
datasets, based on which users can evaluate and improve their methods. In this paper, we …
Unlearnable 3D point clouds: Class-wise transformation is all you need
Traditional unlearnable strategies have been proposed to prevent unauthorized users from
training on the 2D image data. With more 3D point cloud data containing sensitivity …
training on the 2D image data. With more 3D point cloud data containing sensitivity …
Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses
As machine learning systems grow in scale, so do their training data requirements, forcing
practitioners to automate and outsource the curation of training data in order to achieve state …
practitioners to automate and outsource the curation of training data in order to achieve state …
Adversarial examples make strong poisons
The adversarial machine learning literature is largely partitioned into evasion attacks on
testing data and poisoning attacks on training data. In this work, we show that adversarial …
testing data and poisoning attacks on training data. In this work, we show that adversarial …