Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
[HTML][HTML] Cyber security in the maritime industry: A systematic survey of recent advances and future trends
The paper presents a classification of cyber attacks within the context of the state of the art in
the maritime industry. A systematic categorization of vessel components has been …
the maritime industry. A systematic categorization of vessel components has been …
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model
The fourth industrial revolution is marked by the rapid growth of Internet of Things (IoT)
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …
Machine learning-based adaptive synthetic sampling technique for intrusion detection
Traditional firewalls and data encryption techniques can no longer match the demands of
current IoT network security due to the rising amount and variety of network threats. In order …
current IoT network security due to the rising amount and variety of network threats. In order …
Enhancing IoT security: A few-shot learning approach for intrusion detection
T Althiyabi, I Ahmad, MO Alassafi - Mathematics, 2024 - mdpi.com
Recently, the number of Internet of Things (IoT)-connected devices has increased daily.
Consequently, cybersecurity challenges have increased due to the natural diversity of the …
Consequently, cybersecurity challenges have increased due to the natural diversity of the …
A Survey of Few‐Shot Learning: An Effective Method for Intrusion Detection
R Duan, D Li, Q Tong, T Yang, X Liu… - Security and …, 2021 - Wiley Online Library
Few‐shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the
focus is on the use of small datasets to train the model. In recent years, there have been …
focus is on the use of small datasets to train the model. In recent years, there have been …
Few-shot network intrusion detection using discriminative representation learning with supervised autoencoder
AS Iliyasu, UA Abdurrahman, L Zheng - Applied Sciences, 2022 - mdpi.com
Recently, intrusion detection methods based on supervised deep learning techniques (DL)
have seen widespread adoption by the research community, as a result of advantages, such …
have seen widespread adoption by the research community, as a result of advantages, such …
MeshID: Few-Shot Finger Gesture Based User Identification Using Orthogonal Signal Interference
Radio frequency (RF) technology has been applied to enable advanced behavioral sensing
in human-computer interaction. Due to its device-free sensing capability and wide …
in human-computer interaction. Due to its device-free sensing capability and wide …
Deep temporal graph infomax for imbalanced insider threat detection
P Gao, H Zhang, M Wang, W Yang, X Wei… - Journal of Computer …, 2025 - Taylor & Francis
Insider threats pose a significant concern for critical information infrastructures. Graph neural
networks are widely used for detection due to their ability to model complex relationships …
networks are widely used for detection due to their ability to model complex relationships …
A review of deep learning strategies for enhancing cybersecurity in networks: Deep learning strategies for enhancing cybersecurity
AJ Bhuvaneshwari, P Kaythry - Journal of Scientific & Industrial …, 2023 - or.niscpr.res.in
Rapid technological improvements have brought significant hazards to sensitive data and
information. Cyberspace has connected various data structures, ranging from private …
information. Cyberspace has connected various data structures, ranging from private …