Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of research in illicit supply-chain networks and new directions to thwart them
Illicit trades have emerged as a significant problem to almost every government across the
world. Their gradual expansion and diversification throughout the years suggests the …
world. Their gradual expansion and diversification throughout the years suggests the …
The invisible arms race: digital trends in illicit goods trafficking and AI-enabled responses
I Mademlis, M Mancuso, C Paternoster… - … on Technology and …, 2024 - ieeexplore.ieee.org
Recent trends in the modus operandi of technologically-aware criminal groups engaged in
illicit goods trafficking (eg, firearms, drugs, cultural artifacts, etc.) have given rise to …
illicit goods trafficking (eg, firearms, drugs, cultural artifacts, etc.) have given rise to …
Machine learning partners in criminal networks
Recent research has shown that criminal networks have complex organizational structures,
but whether this can be used to predict static and dynamic properties of criminal networks …
but whether this can be used to predict static and dynamic properties of criminal networks …
Human and social capital strategies for Mafia network disruption
Social Network Analysis (SNA) is an interdisciplinary science that focuses on discovering
the patterns of individuals interactions. In particular, practitioners have used SNA to describe …
the patterns of individuals interactions. In particular, practitioners have used SNA to describe …
Link prediction algorithm based on the initial information contribution of nodes
Y Liu, S Liu, F Yu, X Yang - Information Sciences, 2022 - Elsevier
Many link prediction algorithms have originated from the process of information transmission
between nodes in recent years. Despite these algorithms can obtain great prediction results …
between nodes in recent years. Despite these algorithms can obtain great prediction results …
[HTML][HTML] Covert network construction, disruption, and resilience: A survey
Covert networks refer to criminal organizations that operate outside the boundaries of the
law; they can be mainly classified as terrorist networks and criminal networks. We consider …
law; they can be mainly classified as terrorist networks and criminal networks. We consider …
Criminal networks analysis in missing data scenarios through graph distances
Data collected in criminal investigations may suffer from issues like:(i) incompleteness, due
to the covert nature of criminal organizations;(ii) incorrectness, caused by either …
to the covert nature of criminal organizations;(ii) incorrectness, caused by either …
A weighted symmetric graph embedding approach for link prediction in undirected graphs
Link prediction is an important task in social network analysis and mining because of its
various applications. A large number of link prediction methods have been proposed …
various applications. A large number of link prediction methods have been proposed …
K-core percolation and node protection strategy for edge-coupling partially interdependent networks
L Zhou, H Liao, F Tan, Z Chen - Expert Systems with Applications, 2025 - Elsevier
In the real-world, there exist mutual dependencies among not only nodes but also edges.
Consequently, the study on the robustness of edge-coupling interdependent networks has …
Consequently, the study on the robustness of edge-coupling interdependent networks has …
Features fusion based link prediction in dynamic neworks
Link prediction is the process of detecting new or missing links in any network. This work
focuses on link prediction in dynamic networks. One of the major challenges of the link …
focuses on link prediction in dynamic networks. One of the major challenges of the link …