Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A survey of malware detection using deep learning
The problem of malicious software (malware) detection and classification is a complex task,
and there is no perfect approach. There is still a lot of work to be done. Unlike most other …
and there is no perfect approach. There is still a lot of work to be done. Unlike most other …
AI-based ransomware detection: A comprehensive review
Ransomware attacks are becoming increasingly sophisticated, thereby rendering
conventional detection methods less effective. Recognizing this challenge, this study …
conventional detection methods less effective. Recognizing this challenge, this study …
[HTML][HTML] Sinner: A reward-sensitive algorithm for imbalanced malware classification using neural networks with experience replay
Reports produced by popular malware analysis services showed a disparity in samples
available for different malware families. The unequal distribution between such classes can …
available for different malware families. The unequal distribution between such classes can …
[HTML][HTML] A Malware-Detection Method Using Deep Learning to Fully Extract API Sequence Features
S Zhang, M Gao, L Wang, S Xu, W Shao, R Kuang - Electronics, 2025 - mdpi.com
Due to the rapid emergence of malware and its greater harm, the successful execution of
malware often brings incalculable losses. Consequently, the detection of malware has …
malware often brings incalculable losses. Consequently, the detection of malware has …
Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models
The rapid expansion of Internet of Things (IoT) devices has significantly increased the
potential for cyber-attacks, making effective detection methods crucial for securing IoT …
potential for cyber-attacks, making effective detection methods crucial for securing IoT …
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition
L Yao, B Liu, Y **n - Journal of Information Security and Applications, 2024 - Elsevier
Malicious file attacks seriously affect network and data security, and recognizing malicious
files and variants is crucial for preventing network attacks. Faced with the challenge of …
files and variants is crucial for preventing network attacks. Faced with the challenge of …
[HTML][HTML] Exploration of salience theory to deep learning: Evidence from Chinese new energy market high-frequency trading
Q Zhu, J Du, Y Li - Data Science and Management, 2024 - Elsevier
Salience theory has been proposed as a new stock trading strategy. To assess the validity of
this proposal, a complex decision trading system was constructed based on salience theory …
this proposal, a complex decision trading system was constructed based on salience theory …
iCNN-LSTM: A batch-based incremental ransomware detection system using Sysmon
J Ispahany, MD Islam, MA Khan, MD Islam - arxiv preprint arxiv …, 2025 - arxiv.org
In response to the increasing ransomware threat, this study presents a novel detection
system that integrates Convolutional Neural Networks (CNNs) and Long Short-Term …
system that integrates Convolutional Neural Networks (CNNs) and Long Short-Term …
Next-Generation Crime Detection and Transmitting: Evaluating Pre-Trained CNN Models
Violence detection has garnered significant attention as there'sa growing demand for
automated methods to identify violent actions. This surge in interest stems from the utilization …
automated methods to identify violent actions. This surge in interest stems from the utilization …
Opcode based malware detection using Stacked Recurrent Neural Networks and Convolutional Neural Networks
A Gokhale, Y Lad, A Mahaur… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Malwares is designed to infiltrate devices and in most cases the underlying operating
system and are packaged in multiple file formats. Considering that Windows operating …
system and are packaged in multiple file formats. Considering that Windows operating …