Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Natural language processing: state of the art, current trends and challenges
Natural language processing (NLP) has recently gained much attention for representing and
analyzing human language computationally. It has spread its applications in various fields …
analyzing human language computationally. It has spread its applications in various fields …
A review of machine learning approaches to spam filtering
In this paper, we present a comprehensive review of recent developments in the application
of machine learning algorithms to Spam filtering, focusing on both textual-and image-based …
of machine learning algorithms to Spam filtering, focusing on both textual-and image-based …
Explainable artificial intelligence in cybersecurity: A survey
Nowadays, Artificial Intelligence (AI) is widely applied in every area of human being's daily
life. Despite the AI benefits, its application suffers from the opacity of complex internal …
life. Despite the AI benefits, its application suffers from the opacity of complex internal …
A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
Weight poisoning attacks on pre-trained models
Recently, NLP has seen a surge in the usage of large pre-trained models. Users download
weights of models pre-trained on large datasets, then fine-tune the weights on a task of their …
weights of models pre-trained on large datasets, then fine-tune the weights on a task of their …
A unified evaluation of textual backdoor learning: Frameworks and benchmarks
Textual backdoor attacks are a kind of practical threat to NLP systems. By injecting a
backdoor in the training phase, the adversary could control model predictions via predefined …
backdoor in the training phase, the adversary could control model predictions via predefined …
Backdoor attacks on pre-trained models by layerwise weight poisoning
\textbf {P} re-\textbf {T} rained\textbf {M} odel\textbf {s} have been widely applied and recently
proved vulnerable under backdoor attacks: the released pre-trained weights can be …
proved vulnerable under backdoor attacks: the released pre-trained weights can be …
Backdoor pre-trained models can transfer to all
Pre-trained general-purpose language models have been a dominating component in
enabling real-world natural language processing (NLP) applications. However, a pre-trained …
enabling real-world natural language processing (NLP) applications. However, a pre-trained …
Plmmark: a secure and robust black-box watermarking framework for pre-trained language models
The huge training overhead, considerable commercial value, and various potential security
risks make it urgent to protect the intellectual property (IP) of Deep Neural Networks (DNNs) …
risks make it urgent to protect the intellectual property (IP) of Deep Neural Networks (DNNs) …
[Књига][B] The text mining handbook: advanced approaches in analyzing unstructured data
Text mining is a new and exciting area of computer science research that tries to solve the
crisis of information overload by combining techniques from data mining, machine learning …
crisis of information overload by combining techniques from data mining, machine learning …