Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Chest x-ray images for lung disease detection using deep learning techniques: a comprehensive survey
MAA Al-qaness, J Zhu, D AL-Alimi, A Dahou… - … Methods in Engineering, 2024 - Springer
In medical imaging, the last decade has witnessed a remarkable increase in the availability
and diversity of chest X-ray (CXR) datasets. Concurrently, there has been a significant …
and diversity of chest X-ray (CXR) datasets. Concurrently, there has been a significant …
Controlled graph neural networks with denoising diffusion for anomaly detection
Leveraging labels in a supervised learning framework as prior knowledge to enhance
network anomaly detection has become a trend. Unfortunately, just a few labels are typically …
network anomaly detection has become a trend. Unfortunately, just a few labels are typically …
Adversarial camouflage for node injection attack on graphs
Node injection attacks on Graph Neural Networks (GNNs) have received increasing
attention recently, due to their ability to degrade GNN performance with high attack success …
attention recently, due to their ability to degrade GNN performance with high attack success …
Understanding and improving adversarial transferability of vision transformers and convolutional neural networks
Convolutional neural networks (CNNs) and visual transformers (ViTs) are both known to be
vulnerable to adversarial examples. Recent work has illustrated the existence of …
vulnerable to adversarial examples. Recent work has illustrated the existence of …
A realistic model extraction attack against graph neural networks
Abstract Model extraction attacks are considered to be a significant avenue of vulnerability in
machine learning. In model extraction attacks, the attacker repeatedly queries a victim model …
machine learning. In model extraction attacks, the attacker repeatedly queries a victim model …
AGS: Transferable adversarial attack for person re-identification by adaptive gradient similarity attack
Person re-identification (Re-ID) has achieved tremendous success in the fields of computer
vision and security. However, Re-ID models are susceptible to adversarial examples, which …
vision and security. However, Re-ID models are susceptible to adversarial examples, which …
Defending adversarial attacks in Graph Neural Networks via tensor enhancement
Abstract Graph Neural Networks (GNNs) have demonstrated remarkable success across
diverse fields, yet remain susceptible to subtle adversarial perturbations that significantly …
diverse fields, yet remain susceptible to subtle adversarial perturbations that significantly …
Explainability in image captioning based on the latent space
This paper focuses on the representation/latent space in neural architectures to develop an
end-to-end explanation approach for Image Captioning (IC) models. By injecting Gaussian …
end-to-end explanation approach for Image Captioning (IC) models. By injecting Gaussian …
A novel hybrid model combining BPNN neural network and ensemble empirical mode decomposition
H Li, Q Wang, D Wei - International Journal of Computational Intelligence …, 2024 - Springer
Neural network models have been successfully used to predict stock prices, weather, and
traffic patterns. Due to the sensitivity of the data, it is very effective in identifying and …
traffic patterns. Due to the sensitivity of the data, it is very effective in identifying and …
Multi-view ensemble learning based-robust graph convolutional networks against adversarial attacks
Graph neural networks (GNNs) have been widely applied in the Internet of Things (IoT) for
the intelligent analysis of data collected by sensors, particularly complex relationships and …
the intelligent analysis of data collected by sensors, particularly complex relationships and …