Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of dynamic analysis and test generation for JavaScript
JavaScript has become one of the most prevalent programming languages. Unfortunately,
some of the unique properties that contribute to this popularity also make JavaScript …
some of the unique properties that contribute to this popularity also make JavaScript …
Person re-identification by deep learning attribute-complementary information
A Schumann, R Stiefelhagen - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
Automatic person re-identification (re-id) across camera boundaries is a challenging
problem. Approaches have to be robust against many factors which influence the visual …
problem. Approaches have to be robust against many factors which influence the visual …
Analysis of JavaScript programs: Challenges and research trends
K Sun, S Ryu - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
JavaScript has been a de facto standard language for client-side web programs, and now it
is expanding its territory to general purpose programs. In this article, we classify the client …
is expanding its territory to general purpose programs. In this article, we classify the client …
JSFlow: Tracking information flow in JavaScript and its APIs
JavaScript drives the evolution of the web into a powerful application platform. Increasingly,
web applications combine services from different providers. The script inclusion mechanism …
web applications combine services from different providers. The script inclusion mechanism …
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many
security problems, including cross-site scripting attacks and malicious advertising code …
security problems, including cross-site scripting attacks and malicious advertising code …
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy
violating information flows. We present an empirical study of the prevalence of such flows on …
violating information flows. We present an empirical study of the prevalence of such flows on …
One size does not fit all: Uncovering and exploiting cross platform discrepant {APIs} in {WeChat}
The past few years have witnessed a boom of mobile super apps, which are the apps
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …
offering multiple services such as e-commerce, e-learning, and e-government via miniapps …
Hulk: Eliciting malicious behavior in browser extensions
We present Hulk, a dynamic analysis system that detects malicious behavior in browser
extensions by monitoring their execution and corresponding network activity. Hulk elicits …
extensions by monitoring their execution and corresponding network activity. Hulk elicits …
Vetting browser extensions for security vulnerabilities with vex
The browser has become the de facto platform for everyday computation and a popular
target for attackers of computer systems. Among the many potential attacks that target or …
target for attackers of computer systems. Among the many potential attacks that target or …
Mystique: Uncovering information leakage from browser extensions
Browser extensions are small JavaScript, CSS and HTML programs that run inside the
browser with special privileges. These programs, often written by third parties, operate on …
browser with special privileges. These programs, often written by third parties, operate on …