Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 523-530.doi: 10.11896/jsjkx.210300083
• Information Security • Previous Articles Next Articles
MAO Dian-hui1,2, HUANG Hui-yu1, ZHAO Shuang1
CLC Number:
[1] HOVYD.The enemy in your own camp:How well can we detect statistically-generated fake reviews-an adversarial study[C]//Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics(Volume 2:Short Papers).2016:351-356. [2] BAO M J,LI J X,ZHANG J,et al.Learning Semantic Coherence for Machine Generated Spam Text Detection[C]//2019 International Joint Conference on Neural Networks(IJCNN).IEEE,2019:1-8. [3] SOLAIMAN I,BRUNDAGE M,CLARK J,et al.Releasestra-tegies and the social impacts of language models[J].arXiv:1908.09203,2019. [4] TRUONG N B,SUN K,LEE G M,et al.Gdpr-compliant personal data management:A blockchain-based solution[J].IEEE Transactions on Information Forensics and Security,2019,15:1746-1761. [5] YU Z,GUO C,XIE Y B,et al.Research on Blockchain Based Pharmaceutical Anti-counterfeit Traceability System[J].Computer Engineering and Applications,2020,56(3):35-41. [6] LI M J,WANG D,ZENG X S,et al.Design of Blockchain Based Food Safety Traceability System[J].Food Science,2019,40(3):279-285. [7] KIRKMAN S,NEWMAN R.A cloud data movement policy architecture based on smart contracts and the ethereum blockchain[C]//2018 IEEE International Conference on Cloud Engineering(IC2E).IEEE,2018:371-377. [8] WANG L,LIU W Y,HAN X W.Blockchain-based government information resource sharing[C]//2017 IEEE 23rd International Conference on Parallel and Distributed Systems(ICPADS).IEEE,2017:804-809. [9] HANIFATUNNISA R,RAHARDJO B.Blockchain based e-vot-ing recording system design[C]//2017 11th International Conference on Telecommunication Systems Services and Applications(TSSA).IEEE,2017:1-6. [10] HUCKLE S,WHITE M.Fake news:A technological approach to proving the origins of content,using blockchains[J].Big data,2017,5(4):356-371. [11] FRAGA-LAMAS P,FERNÁNDEZ-CARAMÉS T M.FakeNews,Disinformation,and Deepfakes:Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality[J].IT Professional,2020,22(2):53-59. [12] SHAO C,CIAMPAGLIA G L,FLAMMINI A,et al.Hoaxy:A platform for tracking online misinformation[C]//Proceedings of the 25th International Conference Companion on World Wide Web.2016:745-750. [13] SWIRE B,ECKER U K H,LEWANDOWSKY S.The role of familiarity in correcting inaccurate information[J].Journal of Experimental Psychology:Learning,Memory,and Cognition,2017,43(12):1948. [14] NGUYEN M T,LABBÉ C.Engineering a tool to detect automatically generated papers[C]//BIR 2016 Bibliometric-enhanced Information Retrieval.2016:54-62. [15] AMANCIOD R.Comparing the topological properties of realand artificially generated scientific manuscripts[J].Scientometrics,2015,105(3):1763-1779. [16] BERESNEVA D.Computer-generated text detection using machine learning:A systematic review[C]//International Confe-rence on Applications of Natural Language to Information Systems.Cham:Springer,2016:421-426. [17] GEHRMANN S,STROBELT H,RUSH A M.Gltr:Statistical detection and visualization of generated text[J].arXiv:1906.04043,2019. [18] PETERS M E,NEUMANN M,IYYER M,et al.Deep contextualized word representations[J].arXiv:1802.05365,2018. [19] RADFORD A,NARASIMHAN K,SALIMANS T,et al.Improving language understanding by generative pre-training[J].OpenAI Blog,2019,1(8):9. [20] JOULIN A,GRAVE E,BOJANOWSKI P,et al.Fasttext.zip:Compressing text classification models[J].arXiv:1612.03651,2016. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[4] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[5] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[6] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[7] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[8] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[9] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[10] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[11] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[12] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[13] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[14] | WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324. |
[15] | CHU Yu-chun, GONG Hang, Wang Xue-fang, LIU Pei-shun. Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 [J]. Computer Science, 2022, 49(6A): 337-344. |
|