Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on heterogeneous graph embedding: methods, techniques, applications and sources
Heterogeneous graphs (HGs) also known as heterogeneous information networks have
become ubiquitous in real-world scenarios; therefore, HG embedding, which aims to learn …
become ubiquitous in real-world scenarios; therefore, HG embedding, which aims to learn …
Network alignment
Complex networks are frequently employed to model physical or virtual complex systems.
When certain entities exist across multiple systems simultaneously, unveiling their …
When certain entities exist across multiple systems simultaneously, unveiling their …
Key player identification in underground forums over attributed heterogeneous information network embedding framework
Online underground forums have been widely used by cybercriminals to exchange
knowledge and trade in illicit products or services, which have played a central role in the …
knowledge and trade in illicit products or services, which have played a central role in the …
Higitclass: Keyword-driven hierarchical classification of github repositories
GitHub has become an important platform for code sharing and scientific exchange. With the
massive number of repositories available, there is a pressing need for topic-based search …
massive number of repositories available, there is a pressing need for topic-based search …
MFLink: User identity linkage across online social networks via multimodal fusion and adversarial learning
S Li, D Lu, Q Li, X Wu, S Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As an essential step in the online social network research, user identity linkage aims to
identify different accounts belonging to the same natural person. Many existing methods rely …
identify different accounts belonging to the same natural person. Many existing methods rely …
Vulnerability intelligence alignment via masked graph attention networks
Cybersecurity vulnerability information is often sourced from multiple channels, such as
government vulnerability repositories, individually maintained vulnerability-gathering …
government vulnerability repositories, individually maintained vulnerability-gathering …
Identifying vulnerable GitHub repositories and users in scientific cyberinfrastructure: An unsupervised graph embedding approach
The scientific cyberinfrastructure community heavily relies on public internet-based systems
(eg, GitHub) to share resources and collaborate. GitHub is one of the most powerful and …
(eg, GitHub) to share resources and collaborate. GitHub is one of the most powerful and …
A heterogeneous network structure publishing security framework based on cloud-edge collaboration
L Qu, Y Wang, J Yang, M Zhao - Computer Networks, 2023 - Elsevier
With the integration of different fields, a large amount of heterogeneous data converges into
a heterogeneous network with different types of nodes and edges. Then it is published by …
a heterogeneous network with different types of nodes and edges. Then it is published by …
Metagraph aggregated heterogeneous graph neural network for illicit traded product identification in underground market
The emerging underground markets (eg, Hack Forums) have been widely used by
cybercriminals to trade in illicit products or services, which have played a vital role in the …
cybercriminals to trade in illicit products or services, which have played a vital role in the …
HUNA: A method of hierarchical unsupervised network alignment for IoT
With the advent of the era of the Internet of Things (IoT), a large number of interconnected
smart devices form a huge network. The network can be abstracted as a graph, and we …
smart devices form a huge network. The network can be abstracted as a graph, and we …