Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cybersecurity in the AI-Based metaverse: A survey
The Metaverse is a multi-user virtual world that combines physical reality with digital virtual
reality. The three basic technologies for building the Metaverse are immersive technologies …
reality. The three basic technologies for building the Metaverse are immersive technologies …
Analysis of cryptocurrency transactions from a network perspective: An overview
As one of the most important and famous applications of blockchain technology,
cryptocurrency has attracted extensive attention recently. Empowered by blockchain …
cryptocurrency has attracted extensive attention recently. Empowered by blockchain …
Financial crimes in web3-empowered metaverse: Taxonomy, countermeasures, and opportunities
At present, the concept of metaverse has sparked widespread attention from the public to
major industries. With the rapid development of blockchain and Web3 technologies, the …
major industries. With the rapid development of blockchain and Web3 technologies, the …
Heterogeneous network representation learning approach for ethereum identity identification
Recently, network representation learning has been widely used to mine and analyze
network characteristics, and it is also applied to blockchain, but most of the embedding …
network characteristics, and it is also applied to blockchain, but most of the embedding …
Cryptocurrency scams: analysis and perspectives
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the
initial expectations, as witnessed by the thousands of tokenised assets available on the …
initial expectations, as witnessed by the thousands of tokenised assets available on the …
The dark flows of cryptocurrency: an overview of money flow behaviors in bitcoin transactions related to online criminal activities and bitcoin mixers
A Olsson, D Andersson - 2024 - diva-portal.org
The decentralized and pseudonymous nature of cryptocurrencies like Bitcoin has made it
easier for criminal entities to engage in illicit activities online compared to relying on …
easier for criminal entities to engage in illicit activities online compared to relying on …
A fast nonnegative autoencoder-based approach to latent feature analysis on high-dimensional and incomplete data
High-Dimensional and Incomplete (HDI) data are frequently encountered in various Big
Data-related applications. Despite its incompleteness, an HDI data repository contains rich …
Data-related applications. Despite its incompleteness, an HDI data repository contains rich …
Blockchain intelligence: Intelligent blockchains for web 3.0 and beyond
As the next-generation Internet characterized by readability, writability, and ownability, Web
3.0 necessitates the fusion of blockchain and artificial intelligence (AI) technologies to …
3.0 necessitates the fusion of blockchain and artificial intelligence (AI) technologies to …
A survey on blockchain consensus mechanism: research overview, current advances and future directions
Purpose As the core technology of blockchain, various consensus mechanisms have
emerged to satisfy the demands of different application scenarios. Since determining the …
emerged to satisfy the demands of different application scenarios. Since determining the …
Cryptocurrency transaction network embedding from static and dynamic perspectives: An overview
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests
from both industrial and academic communities. With its rapid development, the …
from both industrial and academic communities. With its rapid development, the …