Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber risk and cybersecurity: a systematic review of data availability
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …
indicating an increase of more than 50% since 2018. With the average cyber insurance …
DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks
W Ding, M Abdel-Basset, R Mohamed - Information Sciences, 2023 - Elsevier
Our daily lives have been profoundly changed over the past few years owing to the growing
presence of the Internet of Things (IoT). Importantly, IoT makes our lives more convenient …
presence of the Internet of Things (IoT). Importantly, IoT makes our lives more convenient …
DroidRL: Feature selection for android malware detection with reinforcement learning
Due to the completely open-source nature of Android, the exploitable vulnerability of
malware attacks is increasing. Machine learning, leading to a great evolution in Android …
malware attacks is increasing. Machine learning, leading to a great evolution in Android …
[HTML][HTML] Joint optimization of UAV-IRS placement and resource allocation for wireless powered mobile edge computing networks
The rapid evolution of communication systems towards the next generation has led to an
increased deployment of Internet of Things (IoT) devices for various real-time applications …
increased deployment of Internet of Things (IoT) devices for various real-time applications …
A dynamic robust DL-based model for android malware detection
The dramatic increase in Android-based smart devices has brought technological revolution
to improve the overall quality of life and thus making it worth a billion-dollar market. Despite …
to improve the overall quality of life and thus making it worth a billion-dollar market. Despite …
Estimation of the shear strength of UHPC beams via interpretable deep learning models: Comparison of different optimization techniques
In this article, optimized deep learning (DL) models with different algorithms are adopted to
estimate the shear strength of rectangular ultra-high performance concrete beams (UHPC …
estimate the shear strength of rectangular ultra-high performance concrete beams (UHPC …
Deep AI-powered cyber threat analysis in IIoT
Distributed Industrial Internet of Things (IIoT) has entirely revolutionized the industrial sector
that varies from autonomous industrial processes to automation of processes without human …
that varies from autonomous industrial processes to automation of processes without human …
RETRACTED ARTICLE: Toward trustworthy human suspicious activity detection from surveillance videos using deep learning
In today's world, suspicious or unusual activities express threats and danger to others. For
the prevention of various security issues, an automatic video detection system is very …
the prevention of various security issues, an automatic video detection system is very …
A hybrid DL-based detection mechanism for cyber threats in secure networks
The astonishing growth of sophisticated ever-evolving cyber threats and attacks throws the
entire Internet-of-Things (IoT) infrastructure into chaos. As the IoT belongs to the …
entire Internet-of-Things (IoT) infrastructure into chaos. As the IoT belongs to the …
[HTML][HTML] An Explainable Deep Learning Approach for Classifying Monkeypox Disease by Leveraging Skin Lesion Image Data
A Maseleno, M Huda… - Emerging Science …, 2024 - ijournalse.org
Abstract According to the World Health Organization's (WHO) external situation report on the
multi-country outbreak of Monkeypox in 2023, from 11 countries in Southeast Asia Regions …
multi-country outbreak of Monkeypox in 2023, from 11 countries in Southeast Asia Regions …