Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Empowering vulnerability prioritization: a heterogeneous graph-driven framework for exploitability prediction
With the increasing number of software vulnerabilities being disclosed each year, prioritizing
them becomes essential as it is challenging to patch all of them promptly. Exploitability …
them becomes essential as it is challenging to patch all of them promptly. Exploitability …
HpGraphNEI: A network entity identification model based on heterophilous graph learning
N Li, T Li, Z Ma, X Hu, S Zhang, F Liu, X Quan… - Information Processing …, 2024 - Elsevier
Network entities have important asset map**, vulnerability, and service delivery
applications. In cyberspace, where the network structure is complex and the number of …
applications. In cyberspace, where the network structure is complex and the number of …
Text classification models for personality disorders identification
This research focuses on identifying personality disorders in individuals using their social
media text. We developed a unique collection of words (PD-Corpus) and a dataset (PD …
media text. We developed a unique collection of words (PD-Corpus) and a dataset (PD …
Surveying the landscape: compound methods for aspect-based sentiment analysis
Aspect-based sentiment Analysis (ABSA) has emerged as a critical research area in natural
language processing, facilitating a deeper understanding of user opinions and sentiments …
language processing, facilitating a deeper understanding of user opinions and sentiments …
Avatars at risk: Exploring public response to sexual violence in immersive digital spaces
As the metaverse emerges as a new frontier of human interaction, understanding public
perceptions of crime in virtual spaces becomes crucial. This study delves into public …
perceptions of crime in virtual spaces becomes crucial. This study delves into public …
Bilateral insider threat detection: Harnessing standalone and sequential activities with recurrent neural networks
Insider threats involving authorised individuals exploiting their access privileges within an
organisation can yield substantial damage compared to external threats. Conventional …
organisation can yield substantial damage compared to external threats. Conventional …
Multi-objective demand responsive transit scheduling in smart city: A multiple populations ant colony system approach
The demand responsive transit (DRT) is a type of bus that does not have a fixed route and
provides flexible travel services within a certain area range based on passengers' needs …
provides flexible travel services within a certain area range based on passengers' needs …
A multi-source heterogeneous medical data enhancement framework based on lakehouse
M Sheng, S Wang, Y Zhang, R Hao, Y Liang… - … Information Science and …, 2024 - Springer
Obtaining high-quality data sets from raw data is a key step before data exploration and
analysis. Nowadays, in the medical domain, a large amount of data is in need of quality …
analysis. Nowadays, in the medical domain, a large amount of data is in need of quality …
Enhancing health information systems security: An ontology model approach
This study explores the implications of integrating Health Information System (HIS) on the
security and privacy of sensitive patient information. It identifies existing gaps in research …
security and privacy of sensitive patient information. It identifies existing gaps in research …
A Review of Prediction Techniques used in Stock Market.
P Sadasivan, R Singh - EAI Endorsed Transactions on …, 2025 - search.ebscohost.com
The prediction of stock market movements is a critical task for investors, financial analysts,
and researchers. In recent years, significant advancements have been made in the field of …
and researchers. In recent years, significant advancements have been made in the field of …