共 34 条
[1]
Detecting Hoaxes, Frauds, and Deception in Writing Style Online
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:461-475
[2]
[Anonymous], 2006, P 5 C LANG RES EV LR
[3]
Castillo C., 2011, Proceedings of the 20th international conference on World wide web, WWW'11, (New York, NY, USA), P675, DOI [10.1145/1963405.1963500, DOI 10.1145/1963405.1963500]
[4]
Firmware code instrumentation technology for internet of things-based services
[J].
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS,
2021, 24 (03)
:941-954
[5]
Chen Mingxuan, 2023, 2023 International Conference on Intelligent Media, Big Data and Knowledge Mining (IMBDKM), P84, DOI 10.1109/IMBDKM57416.2023.00022
[6]
Devlin J., 2018, arXiv
[7]
Gaonkar S., 2019, 2019 INT C VISION EM, DOI DOI 10.1109/VITECON.2019.8899556
[8]
Granik M, 2017, 2017 IEEE FIRST UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON), P900, DOI 10.1109/UKRCON.2017.8100379
[9]
GhostNet: More Features from Cheap Operations
[J].
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2020,
:1577-1586
[10]
Hochreiter S, 1997, NEURAL COMPUT, V9, P1735, DOI [10.1162/neco.1997.9.8.1735, 10.1162/neco.1997.9.1.1, 10.1007/978-3-642-24797-2]