Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey on explainable AI: From approaches, limitations and applications aspects
In recent years, artificial intelligence (AI) technology has been used in most if not all domains
and has greatly benefited our lives. While AI can accurately extract critical features and …
and has greatly benefited our lives. While AI can accurately extract critical features and …
Deep learning based vulnerability detection: Are we there yet?
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …
security. Existing program analysis techniques either suffer from high false positives or false …
Explainable artificial intelligence in cybersecurity: A survey
Nowadays, Artificial Intelligence (AI) is widely applied in every area of human being's daily
life. Despite the AI benefits, its application suffers from the opacity of complex internal …
life. Despite the AI benefits, its application suffers from the opacity of complex internal …
Deep learning based attack detection for cyber-physical system cybersecurity: A survey
With the booming of cyber attacks and cyber criminals against cyber-physical systems
(CPSs), detecting these attacks remains challenging. It might be the worst of times, but it …
(CPSs), detecting these attacks remains challenging. It might be the worst of times, but it …
Parameterized explainer for graph neural network
Despite recent progress in Graph Neural Networks (GNNs), explaining predictions made by
GNNs remains a challenging open problem. The leading method mainly addresses the local …
GNNs remains a challenging open problem. The leading method mainly addresses the local …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
[HTML][HTML] Machine learning and deep learning methods for intrusion detection systems: A survey
H Liu, B Lang - applied sciences, 2019 - mdpi.com
Networks play important roles in modern life, and cyber security has become a vital research
area. An intrusion detection system (IDS) which is an important cyber security technique …
area. An intrusion detection system (IDS) which is an important cyber security technique …
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
Lack of transparency in deep neural networks (DNNs) make them susceptible to backdoor
attacks, where hidden associations or triggers override normal classification to produce …
attacks, where hidden associations or triggers override normal classification to produce …
Strip: A defence against trojan attacks on deep neural networks
A recent trojan attack on deep neural network (DNN) models is one insidious variant of data
poisoning attacks. Trojan attacks exploit an effective backdoor created in a DNN model by …
poisoning attacks. Trojan attacks exploit an effective backdoor created in a DNN model by …
A survey of android malware detection with deep neural models
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …
security research. Deep learning models have many advantages over traditional Machine …