Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Research review for broad learning system: Algorithms, theory, and applications
In recent years, the appearance of the broad learning system (BLS) is poised to
revolutionize conventional artificial intelligence methods. It represents a step toward building …
revolutionize conventional artificial intelligence methods. It represents a step toward building …
When energy trading meets blockchain in electrical power system: The state of the art
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
A distributed deep learning system for web attack detection on edge devices
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …
devices and sensors transmit huge amounts of data to cloud data centers for further …
Block-DEF: A secure digital evidence framework using blockchain
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Edge computing provides high-class intelligent services and computing capabilities at the
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …
Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory
Conducting reputation management is very important for Internet of vehicles. However, most
of the existing work evaluate the effectiveness of their schemes with settled attacking …
of the existing work evaluate the effectiveness of their schemes with settled attacking …
Consortium blockchain-based malware detection in mobile devices
To address the problem of detecting malicious codes in malware and extracting the
corresponding evidences in mobile devices, we construct a consortium blockchain …
corresponding evidences in mobile devices, we construct a consortium blockchain …
Bus-trajectory-based street-centric routing for message delivery in urban vehicular ad hoc networks
This paper focuses on the routing algorithm for the communications between vehicles and
places in urban vehicular ad hoc networks. As one of the basic transportation facilities in an …
places in urban vehicular ad hoc networks. As one of the basic transportation facilities in an …