Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …
Anomaly detection in autonomous electric vehicles using AI techniques: A comprehensive survey
The next wave in smart transportation is directed towards the design of renewable energy
sources that can fuel automobile sector to shift towards the autonomous electric vehicles …
sources that can fuel automobile sector to shift towards the autonomous electric vehicles …
A taxonomy of AI techniques for 6G communication networks
With 6G flagship program launched by the University of Oulu, Finland, for full future
adaptation of 6G by 2030, many institutes worldwide have started to explore various issues …
adaptation of 6G by 2030, many institutes worldwide have started to explore various issues …
An edge computing based anomaly detection method in IoT industrial sustainability
X Yu, X Yang, Q Tan, C Shan, Z Lv - Applied Soft Computing, 2022 - Elsevier
In recent years, the evolving Internet of Things (IoT) technology has been widely used in
various industrial scenarios, whereby massive sensor data involving both normal data and …
various industrial scenarios, whereby massive sensor data involving both normal data and …
Evaluation of metaverse tools based on privacy model using fuzzy MCDM approach
NA Husin, AA Abdulsaeed, YR Muhsen… - … Integrated Sciences and …, 2023 - Springer
The issue of uncertainty in decision modelling for control engineering tools that support
industrial cyber-physical metaverse smart manufacturing systems (ICPMSMSs) can be …
industrial cyber-physical metaverse smart manufacturing systems (ICPMSMSs) can be …
Leveraging AI‐enabled 6G‐driven IoT for sustainable smart cities
B Gera, YS Raghuvanshi, O Rawlley… - International Journal …, 2023 - Wiley Online Library
Many scholastic researches have begun around the globe about the competitive
technological interventions like 5G communication networks and its challenges. The …
technological interventions like 5G communication networks and its challenges. The …
Edge server placement problem in multi-access edge computing environment: models, techniques, and applications
Abstract Multi-Access Edge Computing (MEC) is known as a promising communication
paradigm that enables IoT and 5G scenarios by using edge servers located in the proximity …
paradigm that enables IoT and 5G scenarios by using edge servers located in the proximity …
Digital twin-assisted intelligent anomaly detection system for Internet of Things
B Bolat-Akça, E Bozkaya-Aras - Ad Hoc Networks, 2024 - Elsevier
The proliferation of Internet of Things (IoT) devices within the cyber–physical infrastructure
has raised privacy and security concerns. This is because processing large amounts of data …
has raised privacy and security concerns. This is because processing large amounts of data …
Network traffic prediction in industrial Internet of Things backbone networks: A multitask learning mechanism
Industrial Internet of Things (IIoT), as a common industrial application of Internet of Things,
has been widely deployed in recent years. End-to-end network traffic is an essential …
has been widely deployed in recent years. End-to-end network traffic is an essential …
Privacy-preserving anomaly detection in cloud manufacturing via federated transformer
With the rapid development of cloud manufacturing, industrial production with edge
computing as the core architecture has been greatly developed. However, edge devices …
computing as the core architecture has been greatly developed. However, edge devices …