Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Social engineering attacks: A survey
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …
between humans more accessible and instant. However, personal and sensitive information …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
The science of detecting LLM-generated text
ACM: Digital Library: Communications of the ACM ACM Digital Library Communications of the
ACM Volume 67, Number 4 (2024), Pages 50-59 The Science of Detecting LLM-Generated Text …
ACM Volume 67, Number 4 (2024), Pages 50-59 The Science of Detecting LLM-Generated Text …
Membership inference attacks from first principles
A membership inference attack allows an adversary to query a trained machine learning
model to predict whether or not a particular example was contained in the model's training …
model to predict whether or not a particular example was contained in the model's training …
Tiresias: Predicting security events through deep learning
With the increased complexity of modern computer attacks, there is a need for defenders not
only to detect malicious activity as it happens, but also to predict the specific steps that will …
only to detect malicious activity as it happens, but also to predict the specific steps that will …
Deepcase: Semi-supervised contextual analysis of security events
Security monitoring systems detect potentially malicious activities in IT infrastructures, by
either looking for known signatures or for anomalous behaviors. Security operators …
either looking for known signatures or for anomalous behaviors. Security operators …
Skill squatting attacks on Amazon Alexa
The proliferation of the Internet of Things has increased reliance on voice-controlled devices
to perform everyday tasks. Although these devices rely on accurate speech recognition for …
to perform everyday tasks. Although these devices rely on accurate speech recognition for …
Sok: Pragmatic assessment of machine learning for network intrusion detection
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Internet-based social engineering psychology, attacks, and defenses: A survey
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …
Chainsmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports
Modern cyber attacks consist of a series of steps and are generally part of larger campaigns.
Large-scale field data provides a quantitative measurement of these campaigns. On the …
Large-scale field data provides a quantitative measurement of these campaigns. On the …