Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
New advancements in cybersecurity: A comprehensive survey
World is now considered as global village because of interconnected networks. Smart
phones and large computing devices exchange millions of information each day. Information …
phones and large computing devices exchange millions of information each day. Information …
Adversarial batch image steganography against CNN-based pooled steganalysis
The application of adversarial embedding in single image steganography exhibits its
advantage in resisting convolutional neural network (CNN)-based steganalysis. As an …
advantage in resisting convolutional neural network (CNN)-based steganalysis. As an …
Computational intelligence in intelligent transportation systems: an overview
MD Hina, A Soukane, A Ramdane-Cherif - Innovative trends in …, 2022 - Springer
Computational intelligence refers to the ability of a computing device or machine to learn
specific tasks based on its data and experience. Computational intelligence is invoked as an …
specific tasks based on its data and experience. Computational intelligence is invoked as an …
Computational intelligence for information security: A survey
R Wang, W Ji - IEEE Transactions on Emerging Topics in …, 2020 - ieeexplore.ieee.org
Information security is the set of processes that protect information away from unauthorized
access, disclosure, replication, modification, or destruction. Recently, more and more real …
access, disclosure, replication, modification, or destruction. Recently, more and more real …
Generative focused feedback residual networks for image steganalysis and hidden information reconstruction
Z Lai, X Zhu, J Wu - Applied Soft Computing, 2022 - Elsevier
Image steganalysis is the process of detecting the presence of hidden information in an
image. Existing image steganalysis methods cannot fully extract hidden image information …
image. Existing image steganalysis methods cannot fully extract hidden image information …
[HTML][HTML] Security breach prediction using Artificial Neural Networks
J Jagannathan, MYM Parvees - Measurement: Sensors, 2022 - Elsevier
These days, there are many sophisticated and swiftly moving cyberthreats. Artificial Neural
Networks (ANN) are used to introduce machine learning models that boost security and add …
Networks (ANN) are used to introduce machine learning models that boost security and add …
Deep clustering network for steganographer detection using latent features extracted from a novel convolutional autoencoder
Steganography is typically used by law enforcement agencies to prevent unauthorized
persons from becoming aware of the existence of a message communicated by military or …
persons from becoming aware of the existence of a message communicated by military or …
Steganographer detection via a similarity accumulation graph convolutional network
Steganographer detection aims to identify guilty users who conceal secret information in a
number of images for the purpose of covert communication in social networks. Existing …
number of images for the purpose of covert communication in social networks. Existing …
Digital Image Steganographer Identification: A Comprehensive Survey.
Q Zhang, Y Zhang, Y Ma, Y Liu… - Computers, Materials & …, 2024 - search.ebscohost.com
The rapid development of the internet and digital media has provided convenience while
also posing a potential risk of steganography abuse. Identifying steganographer is essential …
also posing a potential risk of steganography abuse. Identifying steganographer is essential …
Content-adaptive selective steganographer detection via embedding probability estimation deep networks
Steganographer detection is to detect culprit users, who attempt to hide confidential
information with steganography, among many innocent users. By incorporating the …
information with steganography, among many innocent users. By incorporating the …