Suggested Topics within your search.
Suggested Topics within your search.
- English language 2
- Moral and ethical aspects 2
- Public relations 2
- ART / Digital 1
- Advertising 1
- Agriculture 1
- Business English 1
- Business and Management 1
- Business writing 1
- Communication 1
- Computer animation 1
- Computer graphics 1
- Digital cinematography 1
- Digital techniques 1
- Economic aspects 1
- Electronic circuits 1
- Fault tolerance (Engineering) 1
- Führung 1
- Grammar 1
- Hospitality industry 1
- Image processing 1
- Information technology 1
- Journalistic ethics 1
- Leadership 1
- Maintainability (Engineering) 1
- Management 1
- Marketing 1
- Photography 1
- Professional ethics 1
- Public relations personnel 1
-
821
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01“…However, the attacker can exploit these assumptions, which reduces their successfulness in real-world scenarios. Thus, a robust method for backdoor detection needs to have broad and simple assumptions. …”
Get full text
Article -
822
Differences in immune-related toxicity between PD-1 and PD-L1 inhibitors: a retrospective cohort study in patients with advanced cancer
Published 2024-11-01“…This study aimed to investigate differences in IRAEs between patients with advanced solid malignances treated with PD-L1 and PD-1 inhibitors in a real-world setting. We conducted a retrospective cohort study at four Swedish Regions. …”
Get full text
Article -
823
Anlotinib as Maintenance Therapy After First-Line Chemotherapy Combined with Consolidation Radiation for Extensive-Stage Small Cell Lung Cancer
Published 2025-01-01“…Owing to the small sample size of the real-world trial, the reliability of our study needs to be confirmed in more studies.…”
Get full text
Article -
824
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01“…The survey highlights real-world adversarial evasion attacks on machine learning-based anti-malware engines under each taxonomical heading, demonstrating the evolution and refinement of these attack strategies over time. …”
Get full text
Article -
825
-
826
LDWLE: self-supervised driven low-light object detection framework
Published 2024-12-01“…In quantitative measurements, it achieves an AP of 25.5 and 38.4 on the synthetic datasets COCO-d and VOC-d, respectively, and achieves the best AP of 30.5 on the real-world dataset ExDark. In qualitative measurements, LDWLE can accurately detect most objects on both public real-world low-light datasets and self-collected ones, demonstrating strong adaptability to varying lighting conditions and multi-scale objects.…”
Get full text
Article -
827
High Frequency Response of Volatile Memristors
Published 2024-12-01“…Abstract In this theoretical study, the high‐frequency response of the electrothermal NbO2‐Mott threshold switch is focused, a real‐world electronic device, which has been proved to be relevant in several applications and is classified as a volatile memristor. …”
Get full text
Article -
828
Existence of solutions for asymptotically periodic quasilinear Schrödinger equations with local nonlinearities
Published 2024-04-01“…By using a Nehari-type constraint and Moser iteration, we get the existence results which is a complement to the ones in Chu and Liu [Nonlinear Anal. Real World Appl. 44(2018), 118–127]. Moreover, we consider a new reformative asymptotic processes of the potential function and the nonlinearity term is only locally defined.…”
Get full text
Article -
829
Metaheuristics for a Large-Scale Vehicle Routing Problem of Same-Day Delivery in E-Commerce Logistics System
Published 2022-01-01“…The proposed method is tested on a large family of instances, including real-world data collected from JD.com, and the effectiveness of the VNS algorithm and also the algorithm components are analyzed.…”
Get full text
Article -
830
Advancing the Understanding of Accountability Processes in Collaborative Governance: Lessons from Research on ‘Agencification’
Published 2024-09-01“…Policy-makers’ strategies for avoiding accountability have been emphasized, but to advance the understanding of real-world accountability processes, we must consider that control deficits can be caused by the passivity of accountability ‘forums’, while policy-makers may find their accountability valuable.…”
Get full text
Article -
831
Cardinality-constrained structured data-fitting problems
Published 2024-05-01“…Numerical experiments on real-world datasets support the analysis and demonstrate the efficiency of the proposed approach.…”
Get full text
Article -
832
User role analysis method based on directed topological potential
Published 2014-12-01“…The majority of real-world networks are directed,weighted and dynamic.Aiming at the problem of node role analysis in directed weighted network,a novel node role analysis method based on directed topological potential is pro-posed,which can divide nodes into four roles based on their behavior pattern and local influence.Then,a node role-based dynamic networks evolution analysis method is introduced,which can model the dynamics of behavioral roles represent-ing the main connectivity patterns over time and detect the significant event.The experiment results indicate that pro-posed approaches can effectively estimate the node role and detect the dynamics of network evolution.…”
Get full text
Article -
833
Analysis and Semantic Mining in Heterogeneous Information Network
Published 2015-07-01“…Heterogeneous information network(HIN),which is composed of different types of objects and links,has gradually become a hot topic in social network analysis.As a unique characteristic of HIN,meta path contains rich semantic information.Heterogeneous information network with values on links are ubiquitous in real world.Therefore,the traditional meta path,which doesn’t consider weight on links,can not exactly capture semantics in many cases.Related concepts of HIN were introduced and a brief introduction of applications of HIN was given.Then subtle semantic information in HIN was explored by extending the traditional meta path to weighted meta path.Experiments on two real data sets demonstrate the applications of the weighted meta path in recommendation,relevance search.…”
Get full text
Article -
834
Byzantine-robust federated learning over Non-IID data
Published 2023-06-01“…The malicious attacks of Byzantine nodes in federated learning was studied over the non-independent and identically distributed dataset , and a privacy protection robust gradient aggregation algorithm was proposed.A reference gradient was designed to identify “poor quality” shared gradients in model training, and the influence of heterogeneity data on Byzantine node recognition was reduced by reputation evaluation.Meanwhile, the combination of homomorphic encryption and random noise obfuscation technology was introduced to protect user privacy in the process of model training and Byzantine node recognition.Finally, through the evaluation over the real-world datasets, the simulation results show that the proposed algorithm can accurately and efficiently identify Byzantine attack nodes while protecting user privacy and has good convergence and robustness.…”
Get full text
Article -
835
Global efficiency estimation method of complex network based on fractal property
Published 2020-07-01“…A method of network efficiency estimation based on fractal property was proposed for solving the problems of high complexity and time-consuming calculation of efficiency in large scale networks.Considering the fractal properties of complex network topology,the relationship between network efficiency and node correlation sum was analyzed,and the global network efficiency was estimated by partial nodes.Besides,to rapidly find the fractal properties of complex networks,a fractal property discrimination method based on node correlation sum was proposed.The experimental analysis in the construction network and the real-world network show that the proposed method can accurately and effectively estimate the global efficiency of the network,which reduces the calculation time by at least 90% compared with the original method.…”
Get full text
Article -
836
Homology analysis of malware based on graph
Published 2017-11-01“…Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph structure with low efficiency.Therefore,this studies a homology analysis method of API graph of malware that use convolutional neural network.By selecting the key nodes,and construct neighborhood receptive field,the convolution neural network can handle graph structure data.Experimental results on 8 real-world malware family,shows that the accuracy rate of homology malware analysis achieves 93%,and the accuracy rate of the detection of malicious code to 96%.…”
Get full text
Article -
837
An insight into the stochastic solitonic features of the Maccari model using the solver technique.
Published 2024-01-01“…We noticed that our results may be useful for solving some real-world physical issues by identifying the motion of an isolated wave in a small area.…”
Get full text
Article -
838
Research on the performance of MAC protocols in UWB-ad hoc system
Published 2007-01-01“…In general,QoS guarantee is the basic element for a communication system in the real world.Accordingly,the relationship between transmission power and SINR was investigated,as well as the relationship between SINR and data rate.And different QoS requirements correspond to various applications.Then a MAC protocol,named TDQG was presented based on TH-UWB-ad hoc system,which can guarantee QoS requirements in term of material traffics.TDQG reserves resource to the potential links to accommodate the distributed character of ad hoc network,and dynamically assigns the resource to make the best of it.A mass of simulation results gave more proves to the superiority of TDQG in UWB-ad hoc system.…”
Get full text
Article -
839
Online analytical model of massive malware based on feature clusting
Published 2013-08-01“…In order to improve the effectiveness and efficiency of mass malicious code analysis,an online analytical model was proposed including feature space construction,automatic feature extraction and fast clustering.Our research focused on the law of malware behavior and code string distribution by dynamic and static techniques.In this model,a sample was described with its API and key code fragment.This model proposed a fast clustering approach to identify group samples that exhibit similar feature when applied this model to real-world malware collections.The result demonstrates that the proposed model is able to extract feature automatically,support streaming data clustering on large-scale,and achieve better precision.…”
Get full text
Article -
840
A Hot-Area-Based Selfish Routing Protocol for Mobile Social Networks
Published 2013-01-01“…However, existing routing schemes seldom consider selfishness of nodes and assume that nodes are willing to forward messages for others. In the real world, most people are selfish and nodes attached to people behave selfishly too. …”
Get full text
Article