Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Brain tumor detection based on multimodal information fusion and convolutional neural network
M Li, L Kuang, S Xu, Z Sha - IEEE access, 2019 - ieeexplore.ieee.org
Aiming at the problem of low accuracy of traditional brain tumor detection, in this paper, a
combination of multimodal information fusion and convolution neural network detection …
combination of multimodal information fusion and convolution neural network detection …
[BOK][B] Machine learning approaches in cyber security analytics
T Thomas, AP Vijayaraghavan, S Emmanuel - 2019 - Springer
This book introduces various machine learning methods for cyber security analytics. With an
overwhelming amount of data being generated and transferred over various networks …
overwhelming amount of data being generated and transferred over various networks …
Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT)
In recent years, with the rapid development of the Internet of Things (IoT), various
applications based on IoT have become more and more popular in industrial and living …
applications based on IoT have become more and more popular in industrial and living …
Android malware identification based on traffic analysis
As numerous new techniques for Android malware attacks have growingly emerged and
evolved, Android malware identification is extremely crucial to prevent mobile applications …
evolved, Android malware identification is extremely crucial to prevent mobile applications …
An empirical evaluation of supervised learning methods for network malware identification based on feature selection
Malware is a sophisticated, malicious, and sometimes unidentifiable application on the
network. The classifying network traffic method using machine learning shows to perform …
network. The classifying network traffic method using machine learning shows to perform …
[HTML][HTML] DroidPortrait: android malware portrait construction based on multidimensional behavior analysis
Recently, security incidents such as sensitive data leakage and video/audio hardware
control caused by Android malware have raised severe security issues that threaten Android …
control caused by Android malware have raised severe security issues that threaten Android …
Androidgyny: Reviewing clustering techniques for Android malware family classification
Thousands of malicious applications (apps) are created daily, modified with the aid of
automation tools, and released on the World Wide Web. Several techniques have been …
automation tools, and released on the World Wide Web. Several techniques have been …
RETRACTED: Application of Clustering Algorithm in Ideological and Political Education in Colleges and Universities
Q Wang - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
In recent years, with the rapid development of information technology, China has entered the
information age. Information technology has changed our life, but also affected the form of …
information age. Information technology has changed our life, but also affected the form of …
Application of clustering analysis in brain gene data based on deep learning
Y Suo, T Liu, X Jia, F Yu - IEEE Access, 2018 - ieeexplore.ieee.org
In the current research, cluster analysis has become a very good way to obtain biological
information by analyzing the brain gene expression data. In recent years, many experts have …
information by analyzing the brain gene expression data. In recent years, many experts have …
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain‐Machine Interfacing
X Su, Q Gong, Y Zheng, X Liu… - … Mathematical Methods in …, 2020 - Wiley Online Library
Recently, brain‐machine interfacing is very popular that link humans and artificial devices
through brain signals which lead to corresponding mobile application as supplementary …
through brain signals which lead to corresponding mobile application as supplementary …