Showing 301 - 320 results of 614 for search '"sources code"', query time: 0.07s Refine Results
  1. 301

    Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation by Gabriel Mendonca, Rosa M. M. Leao, Edmundo De Souza E. Silva, Don Towsley

    Published 2025-01-01
    “…We collect data on DDoS attacks by generating real attack traffic from the homes of a selected group of volunteers, utilizing authentic malware source code. In that experiment, conducted using the residences of volunteers and over one month, our system detected 99.1% of all DDoS attacks launched, with no false alarms.…”
    Get full text
    Article
  2. 302

    AV-FDTI: Audio-visual fusion for drone threat identification by Yizhuo Yang, Shenghai Yuan, Jianfei Yang, Thien Hoang Nguyen, Muqing Cao, Thien-Minh Nguyen, Han Wang, Lihua Xie

    Published 2024-09-01
    “…In our commitment to advancing this field, we will release this work as open-source code and wearable AV-FDTI design, contributing valuable resources to the research community.…”
    Get full text
    Article
  3. 303

    Auto regressive neural network-driven reliability optimization in base-isolated building design by John Thedy, Kuo-Wei Liao, Taeyong Kim

    Published 2025-06-01
    “…The ARNN's efficiency enables high-accuracy RBDO with NLTHA-level precision and acceptable computation time. The supporting source codes of proposed ARNN are available at https://github.com/johnthedy/Auto-Regressive-Neural-Network.…”
    Get full text
    Article
  4. 304

    Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation by Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso

    Published 2024-12-01
    “…We have carried out the attack in practice on a microcontroller target running the reference implementation of Classic McEliece, and make the full attack source code available. …”
    Get full text
    Article
  5. 305

    Multi‐omics graph convolutional networks for digestive system tumour classification and early‐late stage diagnosis by Lin Zhou, Zhengzhi Zhu, Hongbo Gao, Chunyu Wang, Muhammad Attique Khan, Mati Ullah, Siffat Ullah Khan

    Published 2024-12-01
    “…The outcomes unequivocally underscore the efficiency and precision of MGTCN in diagnosing diverse DST tumour types and successfully discriminating between early‐late stage DST cases. The source code for this groundbreaking study is readily accessible for download at https://github.com/bigone1/MGTCN.…”
    Get full text
    Article
  6. 306

    MDRN: Multi-distillation residual network for efficient MR image super-resolution by Liwei Deng, Jingyi Chen, Xin Yang, Sijuan Huang

    Published 2024-10-01
    “…Our method outperforms other existing methods in peak signal-noise ratio by up to 0.44–1.82 dB in 4× scale when GPU memory and runtime are lower than in other SR methods. The source code will be available at https://github.com/Jennieyy/MDRN.…”
    Get full text
    Article
  7. 307

    Advancing landscape characterisation: A comparative study of machine learning and manual classification methods by Tingting Huang, Geoffrey Griffiths, Bo Huang, Jianning Zhu, Steven Warnock, Martin Lukac

    Published 2025-12-01
    “…Our findings demonstrate the potential of automated approaches to improve the consistency, efficiency, and objectivity of LCA and support their integration into scalable landscape characterisation frameworks for planning and management applications. Our source code and datasets are available on GitHub.…”
    Get full text
    Article
  8. 308

    Deep Defense Against Mal-Doc: Utilizing Transformer and SeqGAN for Detecting and Classifying Document Type Malware by Gati Lother Martin, Sang-Min Lee, Jong-Hyun Kim, Young-Seob Jeong, Ah Reum Kang, Jiyoung Woo

    Published 2025-03-01
    “…Initially, we develop MalCode2Vec to learn associations between source codes and represent them as numeric vectors. Subsequently, we design a Transformer-based model for document malware detection and family classification. …”
    Get full text
    Article
  9. 309

    Privacy-Preserving Continual Federated Clustering via Adaptive Resonance Theory by Naoki Masuyama, Yusuke Nojima, Yuichiro Toda, Chu Kiong Loo, Hisao Ishibuchi, Naoyuki Kubota

    Published 2024-01-01
    “…Experimental results with synthetic and real-world datasets show that the proposed algorithm has superior clustering performance to state-of-the-art federated clustering algorithms while realizing data privacy protection and continual learning ability. The source code is available at <uri>https://github.com/Masuyama-lab/FCAC</uri>.…”
    Get full text
    Article
  10. 310

    Predicting Affinity Through Homology (PATH): Interpretable binding affinity prediction with persistent homology. by Yuxi Long, Bruce R Donald

    Published 2025-06-01
    “…In summary, we report progress in a novel combination of interpretability, speed, and accuracy that should further empower topological screening of large virtual inhibitor libraries to protein targets, and allow binding affinity predictions to be understood and trusted. The source code for PATH+ and PATH- is released open-source as part of the OSPREY protein design software package.…”
    Get full text
    Article
  11. 311

    T-UNet: triplet UNet for change detection in high-resolution remote sensing images by Huan Zhong, Chen Wu

    Published 2025-03-01
    “…Extensive experiments verify the effectiveness of the proposed structure and modules as well as the superiority of the proposed T-UNet. The source code for the proposed T-UNet is accessible at https://github.com/Pl-2000/T-UNet.…”
    Get full text
    Article
  12. 312

    Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability by Mifthahul Rahmi, Yuhandri Yunus, Sumijan Sumijan

    Published 2024-12-01
    “…The optimization process involved source code review and enhancement to improve website features. …”
    Get full text
    Article
  13. 313

    Modeling IoT Smart Home Network by U. A. Vishnyakou, Yu. Chuyue

    Published 2022-10-01
    “…MQTT is used as an access protocol in the IoT SH network to achieve fast and reliable data transmission. Open source code, reliability, simplicity and other characteristics justify the choice of this data transfer protocol. …”
    Get full text
    Article
  14. 314

    ErrorExplainer: Automated Extraction of Error Contexts from Smart Contracts by JongHyup Lee

    Published 2025-05-01
    “…A lightweight static analysis of verified source code lifts every transaction-reverting statement into a canonical error representation of an origin function, a guard condition, and an expected error message. …”
    Get full text
    Article
  15. 315

    Enhanced YOLOv7-Tiny for Small-Scale Fire Detection via Multi-Scale Channel Spatial Attention and Dynamic Upsampling by Shihao Wu, Yi Xia

    Published 2025-01-01
    “…These results highlight the potential of our model as a competitive tool for detecting fires, especially at small scales. The source code and datasets are publicly available to facilitate reproducibility and further research in this domain. …”
    Get full text
    Article
  16. 316

    Knowledge Distillation for Face Recognition Using Synthetic Data With Dynamic Latent Sampling by Hatef Otroshi Shahreza, Anjith George, Sebastien Marcel

    Published 2024-01-01
    “…The results also show that SynthDistill significantly narrows the gap between real and synthetic data training. The source code of our experiments is publicly available to facilitate the reproducibility of our work.…”
    Get full text
    Article
  17. 317
  18. 318

    Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model by Yuan Liu, Yilong Liu, Xiaoyan Guo, Xi Ling, Qingyi Geng

    Published 2025-04-01
    “…Compared to other mainstream models, SLF-YOLO demonstrates strong detection accuracy while maintaining a lightweight architecture, making it highly suitable for industrial applications in metal surface defect detection. The source code is available at https://github.com/zacianfans/SLF-YOLO .…”
    Get full text
    Article
  19. 319

    Computational inference of co-regulatory modules from transcription factors, MicroRNAs, and their targets using CanMod2 by Ziynet Nesibe Kesimoglu, Jubair Ibn Malik Rifat, Serdar Bozdag

    Published 2025-04-01
    “…The inferred regulator-target interactions were significantly enriched in ground truth interactions. CanMod2 source code and documentation are publicly available at https://github.com/bozdaglab/CanMod2 .…”
    Get full text
    Article
  20. 320

    Learning-based parallel acceleration for HaplotypeCaller by Xiangxing Lai, Minguang Xiao, Lingling Weng, Zhiguang Chen

    Published 2025-08-01
    “…And LPA maintaining a high accuracy with over 99.9%, enhancing the efficiency and reliability of variant calling. The source code of LPA is publicly available at https://github.com/laixx9/LPA .…”
    Get full text
    Article