Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Online social networks security and privacy: comprehensive review and analysis
With fast-growing technology, online social networks (OSNs) have exploded in popularity
over the past few years. The pivotal reason behind this phenomenon happens to be the …
over the past few years. The pivotal reason behind this phenomenon happens to be the …
Machine learning algorithms for social media analysis: A survey
Social Media (SM) are the most widespread and rapid data generation applications on the
Internet increase the study of these data. However, the efficient processing of such massive …
Internet increase the study of these data. However, the efficient processing of such massive …
Cyberbullying detection solutions based on deep learning architectures
C Iwendi, G Srivastava, S Khan, PKR Maddikunta - Multimedia Systems, 2023 - Springer
Cyberbullying is disturbing and troubling online misconduct. It appears in various forms and
is usually in a textual format in most social networks. Intelligent systems are necessary for …
is usually in a textual format in most social networks. Intelligent systems are necessary for …
Predicting cyberbullying on social media in the big data era using machine learning algorithms: review of literature and open challenges
Prior to the innovation of information communication technologies (ICT), social interactions
evolved within small cultural boundaries such as geo spatial locations. The recent …
evolved within small cultural boundaries such as geo spatial locations. The recent …
[HTML][HTML] Cyberbullying detection on twitter using deep learning-based attention mechanisms and continuous Bag of words feature extraction
Since social media platforms are widely used and popular, they have given us more
opportunities than we can even imagine. Despite all of the known benefits, some users may …
opportunities than we can even imagine. Despite all of the known benefits, some users may …
” You have to prove the threat is real”: Understanding the needs of Female Journalists and Activists to Document and Report Online Harassment
Online harassment is a major societal challenge that impacts multiple communities. Some
members of community, like female journalists and activists, bear significantly higher …
members of community, like female journalists and activists, bear significantly higher …
Email-based cyberstalking detection on textual data using multi-model soft voting technique of machine learning approach
In the virtual world, many internet applications are used by a mass of people for several
purposes. Internet applications are the basic needs of people in the modern days of lifestyle …
purposes. Internet applications are the basic needs of people in the modern days of lifestyle …
Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities
Predicting offenders and victims and the timing of their offenses and damages has become a
perennial challenge in global cyberspace. This study aimed to solve this challenge through …
perennial challenge in global cyberspace. This study aimed to solve this challenge through …
Proactive threat detection for connected cars using recursive Bayesian estimation
Upcoming disruptive technologies around autonomous driving of connected cars have not
yet been matched with appropriate security by design principles and lack approaches to …
yet been matched with appropriate security by design principles and lack approaches to …
Multilingual transformer-based personality traits estimation
Intelligent agents have the potential to understand personality traits of human beings
because of their every day interaction with us. The assessment of our psychological traits is …
because of their every day interaction with us. The assessment of our psychological traits is …