-
1221
-
1222
A New Website Fingerprinting Method for Tor Hidden Service
Published 2025-01-01Subjects: Get full text
Article -
1223
Deep patch‐wise supervision for presentation attack detection
Published 2022-09-01Subjects: Get full text
Article -
1224
STRUCTURAL DAMAGE DETECTION BASED ON THE EXCITATION POINTS OPTIMIZATION AND ENERGY OF SIGNALS
Published 2021-01-01Subjects: “…Damage detection…”
Get full text
Article -
1225
Outlier Detection Method of Dam Monitoring Data Based on Robust Estimation and Variable Separation
Published 2024-01-01Subjects: “…outlier detection…”
Get full text
Article -
1226
SIMULATION AND EXPERIMENTS ON SELECTING THE ECHO FREQUENCY IN DETECTING THE HEAT EXCHANGE TUBE FOULING
Published 2019-01-01Subjects: Get full text
Article -
1227
Automated polymorphic worm signature generation approach based on seed-extending
Published 2014-09-01Subjects: Get full text
Article -
1228
Using Generative Adversarial Networks for the synthesis of emotional facial expressions in virtual educational environments
Published 2025-03-01Subjects: Get full text
Article -
1229
The Fluorescent Detection of Alkaline Phosphatase Based on Iron Nanoclusters and a Manganese Dioxide Nanosheet
Published 2025-01-01Subjects: Get full text
Article -
1230
Lightweight object detection model for food freezer warehouses
Published 2025-01-01Subjects: Get full text
Article -
1231
An efficient convolution neural network method for copy-move video forgery detection
Published 2025-01-01Subjects: Get full text
Article -
1232
DualTransAttNet: A Hybrid Model with a Dual Attention Mechanism for Corn Seed Classification
Published 2025-01-01Subjects: “…non-destructive seed detection…”
Get full text
Article -
1233
Feature Fusion Model Using Transfer Learning and Bidirectional Attention Mechanism for Plant Pipeline Leak Detection
Published 2025-01-01Subjects: “…pipeline leak detection…”
Get full text
Article -
1234
Machine Learning Applications to Dust Storms: A Meta-Analysis
Published 2022-10-01Subjects: Get full text
Article -
1235
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
1236
Efficient anomaly detection in tabular cybersecurity data using large language models
Published 2025-01-01Subjects: “…Anomaly detection…”
Get full text
Article -
1237
SECONDARY FEEDBACK RIDGE ESTIMATION METHOD FOR STRUCTURAL DAMAGE DETECTION
Published 2024-08-01Subjects: “…Damage detection…”
Get full text
Article -
1238
Privacy protection risk identification mechanism based on automated feature combination
Published 2024-11-01Subjects: “…anomaly detection…”
Get full text
Article -
1239
Geomorphic time series reveals the constructive and destructive history of Havre caldera volcano, Kermadec arc
Published 2025-01-01Subjects: “…submarine-eruption change detection…”
Get full text
Article -
1240
Research progress of deep learning-based object detection of optical remote sensing image
Published 2022-05-01Subjects: Get full text
Article