Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deterring adversarial learning in penetration testing by exploiting domain adaptation theory
Artificial intelligence (AI) and machine learning (ML) are increasingly being used in cyber
operations. Because of techniques like adversarial learning, the performance of network …
operations. Because of techniques like adversarial learning, the performance of network …
Towards operational resilience for AI-based cyber in multi-domain operations
There is a growing orientation of cyber systems, technologies, and processes away from
notions of cybersecurity and towards notions of cyber resilience. In multi-domain operation …
notions of cybersecurity and towards notions of cyber resilience. In multi-domain operation …
On extending the automatic test markup language (ATML) for machine learning
This paper addresses the urgent need for messaging standards in the operational test and
evaluation (T&E) of machine learning (ML) applications, particularly in edge ML applications …
evaluation (T&E) of machine learning (ML) applications, particularly in edge ML applications …
Cascading negative transfer in networks of machine learning systems
Wide-spread use of transfer learning establishes inter-linkages between otherwise disparate
parts of systems. These inter-linkages create systemic risks of cascading failure. This paper …
parts of systems. These inter-linkages create systemic risks of cascading failure. This paper …
Test and evaluation harnesses for learning systems
There is an increasing demand for operational uses of machine learning (ML), however, a
lack of best practices for test and evaluation (T &E) of learning systems is a hindrance to …
lack of best practices for test and evaluation (T &E) of learning systems is a hindrance to …
Combinatorial coverage framework for machine learning in multi-domain operations
Multi-domain operations (MDO) are characterized by simultaneous and sequential
operations; rapid and continuous integration; and surprise. Machine learning (ML) for MDO …
operations; rapid and continuous integration; and surprise. Machine learning (ML) for MDO …
Product herding for intelligent systems
The endogenous evolution of intelligent systems exposes insufficiencies in some systems
engineering activities that rely on exogenous properties of systems. One of these activities is …
engineering activities that rely on exogenous properties of systems. One of these activities is …
RESONANT: Reinforcement Learning-based Moving Target Defense for Credit Card Fraud Detection
According to security. org, as of 2023, 65% of credit card (CC) users in the US have been
subjected to fraud at some point in their lives, which equates to about 151 million Americans …
subjected to fraud at some point in their lives, which equates to about 151 million Americans …
Transfer distance and operating envelopes to detect non-stationarity in cyber environments
While machine learning models have demonstrated the ability to detect cyber attacks, their
deployment to operational scenarios is often limited due to the possibility of the model failing …
deployment to operational scenarios is often limited due to the possibility of the model failing …
Anticipating spectrogram classification error with combinatorial coverage metrics
Recently, combinatorial interaction testing (CIT) has been applied to machine learning.
Recent results demonstrate that combinatorial coverage metrics can correlate with …
Recent results demonstrate that combinatorial coverage metrics can correlate with …