-
301
Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation
Published 2025-01-01“…We collect data on DDoS attacks by generating real attack traffic from the homes of a selected group of volunteers, utilizing authentic malware source code. In that experiment, conducted using the residences of volunteers and over one month, our system detected 99.1% of all DDoS attacks launched, with no false alarms.…”
Get full text
Article -
302
AV-FDTI: Audio-visual fusion for drone threat identification
Published 2024-09-01“…In our commitment to advancing this field, we will release this work as open-source code and wearable AV-FDTI design, contributing valuable resources to the research community.…”
Get full text
Article -
303
Auto regressive neural network-driven reliability optimization in base-isolated building design
Published 2025-06-01“…The ARNN's efficiency enables high-accuracy RBDO with NLTHA-level precision and acceptable computation time. The supporting source codes of proposed ARNN are available at https://github.com/johnthedy/Auto-Regressive-Neural-Network.…”
Get full text
Article -
304
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Published 2024-12-01“…We have carried out the attack in practice on a microcontroller target running the reference implementation of Classic McEliece, and make the full attack source code available. …”
Get full text
Article -
305
Multi‐omics graph convolutional networks for digestive system tumour classification and early‐late stage diagnosis
Published 2024-12-01“…The outcomes unequivocally underscore the efficiency and precision of MGTCN in diagnosing diverse DST tumour types and successfully discriminating between early‐late stage DST cases. The source code for this groundbreaking study is readily accessible for download at https://github.com/bigone1/MGTCN.…”
Get full text
Article -
306
MDRN: Multi-distillation residual network for efficient MR image super-resolution
Published 2024-10-01“…Our method outperforms other existing methods in peak signal-noise ratio by up to 0.44–1.82 dB in 4× scale when GPU memory and runtime are lower than in other SR methods. The source code will be available at https://github.com/Jennieyy/MDRN.…”
Get full text
Article -
307
Advancing landscape characterisation: A comparative study of machine learning and manual classification methods
Published 2025-12-01“…Our findings demonstrate the potential of automated approaches to improve the consistency, efficiency, and objectivity of LCA and support their integration into scalable landscape characterisation frameworks for planning and management applications. Our source code and datasets are available on GitHub.…”
Get full text
Article -
308
Deep Defense Against Mal-Doc: Utilizing Transformer and SeqGAN for Detecting and Classifying Document Type Malware
Published 2025-03-01“…Initially, we develop MalCode2Vec to learn associations between source codes and represent them as numeric vectors. Subsequently, we design a Transformer-based model for document malware detection and family classification. …”
Get full text
Article -
309
Privacy-Preserving Continual Federated Clustering via Adaptive Resonance Theory
Published 2024-01-01“…Experimental results with synthetic and real-world datasets show that the proposed algorithm has superior clustering performance to state-of-the-art federated clustering algorithms while realizing data privacy protection and continual learning ability. The source code is available at <uri>https://github.com/Masuyama-lab/FCAC</uri>.…”
Get full text
Article -
310
Predicting Affinity Through Homology (PATH): Interpretable binding affinity prediction with persistent homology.
Published 2025-06-01“…In summary, we report progress in a novel combination of interpretability, speed, and accuracy that should further empower topological screening of large virtual inhibitor libraries to protein targets, and allow binding affinity predictions to be understood and trusted. The source code for PATH+ and PATH- is released open-source as part of the OSPREY protein design software package.…”
Get full text
Article -
311
T-UNet: triplet UNet for change detection in high-resolution remote sensing images
Published 2025-03-01“…Extensive experiments verify the effectiveness of the proposed structure and modules as well as the superiority of the proposed T-UNet. The source code for the proposed T-UNet is accessible at https://github.com/Pl-2000/T-UNet.…”
Get full text
Article -
312
Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability
Published 2024-12-01“…The optimization process involved source code review and enhancement to improve website features. …”
Get full text
Article -
313
Modeling IoT Smart Home Network
Published 2022-10-01“…MQTT is used as an access protocol in the IoT SH network to achieve fast and reliable data transmission. Open source code, reliability, simplicity and other characteristics justify the choice of this data transfer protocol. …”
Get full text
Article -
314
ErrorExplainer: Automated Extraction of Error Contexts from Smart Contracts
Published 2025-05-01“…A lightweight static analysis of verified source code lifts every transaction-reverting statement into a canonical error representation of an origin function, a guard condition, and an expected error message. …”
Get full text
Article -
315
Enhanced YOLOv7-Tiny for Small-Scale Fire Detection via Multi-Scale Channel Spatial Attention and Dynamic Upsampling
Published 2025-01-01“…These results highlight the potential of our model as a competitive tool for detecting fires, especially at small scales. The source code and datasets are publicly available to facilitate reproducibility and further research in this domain. …”
Get full text
Article -
316
Knowledge Distillation for Face Recognition Using Synthetic Data With Dynamic Latent Sampling
Published 2024-01-01“…The results also show that SynthDistill significantly narrows the gap between real and synthetic data training. The source code of our experiments is publicly available to facilitate the reproducibility of our work.…”
Get full text
Article -
317
The Blending ToolKit: A simulation framework for evaluation of galaxy detection and deblending
Published 2025-02-01“…BTK includes a suite of tutorials and comprehensive documentation. The source code is publicly available on GitHub at https://github.com/LSSTDESC/BlendingToolKit.…”
Get full text
Article -
318
Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model
Published 2025-04-01“…Compared to other mainstream models, SLF-YOLO demonstrates strong detection accuracy while maintaining a lightweight architecture, making it highly suitable for industrial applications in metal surface defect detection. The source code is available at https://github.com/zacianfans/SLF-YOLO .…”
Get full text
Article -
319
Computational inference of co-regulatory modules from transcription factors, MicroRNAs, and their targets using CanMod2
Published 2025-04-01“…The inferred regulator-target interactions were significantly enriched in ground truth interactions. CanMod2 source code and documentation are publicly available at https://github.com/bozdaglab/CanMod2 .…”
Get full text
Article -
320
Learning-based parallel acceleration for HaplotypeCaller
Published 2025-08-01“…And LPA maintaining a high accuracy with over 99.9%, enhancing the efficiency and reliability of variant calling. The source code of LPA is publicly available at https://github.com/laixx9/LPA .…”
Get full text
Article