Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical …
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …
and services that are vital for the functioning and well-being of a society, economy, or nation …
Deep reinforcement learning for cyber security
The scale of Internet-connected systems has increased considerably, and these systems are
being exposed to cyberattacks more than ever. The complexity and dynamics of …
being exposed to cyberattacks more than ever. The complexity and dynamics of …
Applications of artificial intelligence in engineering and manufacturing: a systematic review
Engineering and manufacturing processes and systems designs involve many challenges,
such as dynamism, chaotic behaviours, and complexity. Of late, the arrival of big data, high …
such as dynamism, chaotic behaviours, and complexity. Of late, the arrival of big data, high …
A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids
Smart grid technology increases reliability, security, and efficiency of the electrical grids.
However, its strong dependencies on digital communication technology bring up new …
However, its strong dependencies on digital communication technology bring up new …
Twenty years of machine-learning-based text classification: A systematic review
Machine-learning-based text classification is one of the leading research areas and has a
wide range of applications, which include spam detection, hate speech identification …
wide range of applications, which include spam detection, hate speech identification …
Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning
Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-
connected devices and nodes (eg, medical devices and wearable combat uniforms). These …
connected devices and nodes (eg, medical devices and wearable combat uniforms). These …
Reinforcement learning for iot security: A comprehensive survey
The number of connected smart devices has been increasing exponentially for different
Internet-of-Things (IoT) applications. Security has been a long run challenge in the IoT …
Internet-of-Things (IoT) applications. Security has been a long run challenge in the IoT …
[HTML][HTML] A survey on machine learning techniques applied to source code
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …
these techniques to a myriad of software engineering tasks that use source code analysis …
Fuzzy pattern tree for edge malware detection and categorization in IoT
The surging pace of Internet of Things (IoT) development and its applications has resulted in
significantly large amounts of data (commonly known as big data) being communicated and …
significantly large amounts of data (commonly known as big data) being communicated and …