Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fabric defect detection in textile manufacturing: a survey of the state of the art
C Li, J Li, Y Li, L He, X Fu, J Chen - Security and …, 2021 - Wiley Online Library
Defects in the textile manufacturing process lead to a great waste of resources and further
affect the quality of textile products. Automated quality guarantee of textile fabric materials is …
affect the quality of textile products. Automated quality guarantee of textile fabric materials is …
A holistic review of machine learning adversarial attacks in IoT networks
With the rapid advancements and notable achievements across various application
domains, Machine Learning (ML) has become a vital element within the Internet of Things …
domains, Machine Learning (ML) has become a vital element within the Internet of Things …
Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system
The advancement of Internet of Things (IoT) technologies leads to a wide penetration and
large-scale deployment of IoT systems across an entire city or even country. While IoT …
large-scale deployment of IoT systems across an entire city or even country. While IoT …
Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0
Various cyber attacks often occur in logistics network of the Industry 4.0, which poses a
threat to Internet security. Intrusion detection can intelligently detect anomalous activities …
threat to Internet security. Intrusion detection can intelligently detect anomalous activities …
Deep correlation mining based on hierarchical hybrid networks for heterogeneous big data recommendations
The advancement of several significant technologies, such as artificial intelligence, cyber
intelligence, and machine learning, has made big data penetrate not only into the industry …
intelligence, and machine learning, has made big data penetrate not only into the industry …
Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city
F Wang, G Li, Y Wang, W Rafique… - ACM Transactions on …, 2023 - dl.acm.org
With the continuous increment of city volume and size, a number of traffic-related urban units
(eg, vehicles, roads, buildings, etc.) are emerging rapidly, which plays a heavy burden on …
(eg, vehicles, roads, buildings, etc.) are emerging rapidly, which plays a heavy burden on …
Popularity-aware and diverse web APIs recommendation based on correlation graph
The ever-increasing web application programming interfaces (APIs) in various service-
sharing communities (eg, ProgrammableWeb. com and Mashape. com) have enabled …
sharing communities (eg, ProgrammableWeb. com and Mashape. com) have enabled …
2D federated learning for personalized human activity recognition in cyber-physical-social systems
The proliferation of the Internet of Things (IoT), wearable computing, and social media
technologies bring forward the realization of the so-called Cyber-Physical-Social Systems …
technologies bring forward the realization of the so-called Cyber-Physical-Social Systems …
Bidirectional GRU networks‐based next POI category prediction for healthcare
Abstract The Corona Virus Disease 2019 has a great impact on public health and public
psychology. People stay at home for a long time and rarely go out. With the improvement of …
psychology. People stay at home for a long time and rarely go out. With the improvement of …
Fuzzy detection system for rumors through explainable adaptive learning
Nowadays, rumor spreading has gradually evolved into a kind of organized behaviors,
accompanied with strong uncertainty and fuzziness. However, existing fuzzy detection …
accompanied with strong uncertainty and fuzziness. However, existing fuzzy detection …