Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Autonomous learning for fuzzy systems: a review
As one of the three pillars in computational intelligence, fuzzy systems are a powerful
mathematical tool widely used for modelling nonlinear problems with uncertainties. Fuzzy …
mathematical tool widely used for modelling nonlinear problems with uncertainties. Fuzzy …
Intrusion detection systems: A cross-domain overview
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …
information of users, companies, and industries. However, the growth of the information …
A review of rule learning-based intrusion detection systems and their prospects in smart grids
Intrusion detection systems (IDS) are commonly categorized into misuse based, anomaly
based and specification based IDS. Both misuse based IDS and anomaly based IDS are …
based and specification based IDS. Both misuse based IDS and anomaly based IDS are …
The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …
experts are seriously considering artificial intelligence as a potential field that can aid …
A secure and privacy-preserving e-government framework using blockchain and artificial immunity
Electronic Government (e-Government) systems constantly provide greater services to
people, businesses, organisations, and societies by offering more information, opportunities …
people, businesses, organisations, and societies by offering more information, opportunities …
Approximate reasoning with fuzzy rule interpolation: background and recent advances
Approximate reasoning systems facilitate fuzzy inference through activating fuzzy if–then
rules in which attribute values are imprecisely described. Fuzzy rule interpolation (FRI) …
rules in which attribute values are imprecisely described. Fuzzy rule interpolation (FRI) …
Machine learning algorithms for network intrusion detection
Network intrusion is a growing threat with potentially severe impacts, which can be
damaging in multiple ways to network infrastructures and digital/intellectual assets in the …
damaging in multiple ways to network infrastructures and digital/intellectual assets in the …
Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network
D Durairaj, TK Venkatasamy… - Energy Sources, Part …, 2024 - Taylor & Francis
The convergence from the electric grid to the smart microgrid motivates the incorporation of
the intrusion detection system to identify intruders and mitigate the resultant damages to …
the intrusion detection system to identify intruders and mitigate the resultant damages to …
A new approach for transformation-based fuzzy rule interpolation
Fuzzy rule interpolation (FRI) is of particular significance for reasoning in the presence of
insufficient knowledge or sparse rule bases. As one of the most popular FRI methods …
insufficient knowledge or sparse rule bases. As one of the most popular FRI methods …
New advancements in cybersecurity: A comprehensive survey
World is now considered as global village because of interconnected networks. Smart
phones and large computing devices exchange millions of information each day. Information …
phones and large computing devices exchange millions of information each day. Information …