Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Alert-driven attack graph generation using s-pdfa
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …
to a network under observation. Such CTI currently requires extensive expert input for …
Learning deterministic weighted automata with queries and counterexamples
We present an algorithm for reconstruction of a probabilistic deterministic finite automaton
(PDFA) from a given black-box language model, such as a recurrent neural network (RNN) …
(PDFA) from a given black-box language model, such as a recurrent neural network (RNN) …
VL-MFL: UAV Visual Localization Based on Multi-Source Image Feature Learning
G Liu, C Li, S Zhang, Y Yuan - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Obtaining the Earth-fixed coordinates is a fundamental requirement for long-distance
unmanned aerial vehicle (UAV) flight. Global navigation satellite systems (GNSSs) are the …
unmanned aerial vehicle (UAV) flight. Global navigation satellite systems (GNSSs) are the …
An interdisciplinary comparison of sequence modeling methods for next-element prediction
Data of sequential nature arise in many application domains in the form of, eg, textual data,
DNA sequences, and software execution traces. Different research disciplines have …
DNA sequences, and software execution traces. Different research disciplines have …
Explaining black boxes on sequential data using weighted automata
S Ayache, R Eyraud, N Goudian - … on grammatical inference, 2019 - proceedings.mlr.press
Understanding how a learned black box works is of crucial interest for the future of Machine
Learning. In this paper, we pioneer the question of the global interpretability of learned black …
Learning. In this paper, we pioneer the question of the global interpretability of learned black …
Benchmarking compositionality with formal languages
Recombining known primitive concepts into larger novel combinations is a quintessentially
human cognitive capability. Whether large neural models in NLP can acquire this ability …
human cognitive capability. Whether large neural models in NLP can acquire this ability …
Flexfringe: a passive automaton learning package
Finite state models, such as Mealy machines or state charts, are often used to express and
specify protocol and software behavior. Consequently, these models are often used in …
specify protocol and software behavior. Consequently, these models are often used in …
Sage: Intrusion alert-driven attack graph extractor
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a
network. State-of-the-art approaches for AG generation focus mostly on deriving …
network. State-of-the-art approaches for AG generation focus mostly on deriving …
Decision-guided weighted automata extraction from recurrent neural networks
Abstract Recurrent Neural Networks (RNNs) have demonstrated their effectiveness in
learning and processing sequential data (eg, speech and natural language). However, due …
learning and processing sequential data (eg, speech and natural language). However, due …
TAYSIR Competition: Transformer+\textscrnn: Algorithms to Yield Simple and Interpretable Representations
R Eyraud, D Lambert, BT Joutei… - International …, 2023 - proceedings.mlr.press
This article presents the content of the competition Transformers+\textsc {rnn}: Algorithms to
Yield Simple and Interpretable Representations (TAYSIR, the Arabic word for 'simple') …
Yield Simple and Interpretable Representations (TAYSIR, the Arabic word for 'simple') …