Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authorship attribution methods, challenges, and future research directions: A comprehensive survey
Over the past few decades, researchers have put their effort and paid significant attention to
the authorship attribution field, as it plays an important role in software forensics analysis …
the authorship attribution field, as it plays an important role in software forensics analysis …
Code authorship attribution: Methods and challenges
Code authorship attribution is the process of identifying the author of a given code. With
increasing numbers of malware and advanced mutation techniques, the authors of malware …
increasing numbers of malware and advanced mutation techniques, the authors of malware …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
Natural attack for pre-trained models of code
Pre-trained models of code have achieved success in many important software engineering
tasks. However, these powerful models are vulnerable to adversarial attacks that slightly …
tasks. However, these powerful models are vulnerable to adversarial attacks that slightly …
Sysevr: A framework for using deep learning to detect software vulnerabilities
The detection of software vulnerabilities (or vulnerabilities for short) is an important problem
that has yet to be tackled, as manifested by the many vulnerabilities reported on a daily …
that has yet to be tackled, as manifested by the many vulnerabilities reported on a daily …
Robustness, security, privacy, explainability, efficiency, and usability of large language models for code
Large language models for code (LLM4Code), which demonstrate strong performance (eg,
high accuracy) in processing source code, have significantly transformed software …
high accuracy) in processing source code, have significantly transformed software …
Authorship attribution for neural text generation
In recent years, the task of generating realistic short and long texts have made tremendous
advancements. In particular, several recently proposed neural network-based language …
advancements. In particular, several recently proposed neural network-based language …
Misleading authorship attribution of source code using adversarial learning
In this paper, we present a novel attack against authorship attribution of source code. We
exploit that recent attribution methods rest on machine learning and thus can be deceived by …
exploit that recent attribution methods rest on machine learning and thus can be deceived by …
Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls
Abstract Advanced Persistent Threats (APTs) are highly sophisticated cyberattacks that are
aimed at achieving strategic goals and are usually backed by a well-funded entity. In this …
aimed at achieving strategic goals and are usually backed by a well-funded entity. In this …
Automatic source code summarization with extended tree-lstm
Neural machine translation models are used to automatically generate a document from
given source code since this can be regarded as a machine translation task. Source code …
given source code since this can be regarded as a machine translation task. Source code …