-
441
Real-time anomaly detection model for worm mails in high-speed network
Published 2006-01-01Subjects: Get full text
Article -
442
Understanding the Influence of Image Enhancement on Underwater Object Detection: A Quantitative and Qualitative Study
Published 2025-01-01Subjects: Get full text
Article -
443
Survey on phishing detection research
Published 2020-10-01Subjects: “…phishing detection…”
Get full text
Article -
444
Triple-attentions based salient object detector for strip steel surface defects
Published 2025-01-01Subjects: Get full text
Article -
445
Contrast-Invariant Edge Detection: A Methodological Advance in Medical Image Analysis
Published 2025-01-01Subjects: Get full text
Article -
446
Smart home with neural network based object detection
Published 2022-03-01Subjects: “…object detection model…”
Get full text
Article -
447
WCMU-net: An Effective Method for Reducing the Impact of Speckle Noise in SAR Image Change Detection
Published 2025-01-01Subjects: “…Change detection…”
Get full text
Article -
448
Cyclostationary Feature Detection Based on Compressed Sensing and Wavelet De-Noising
Published 2015-08-01Subjects: “…cyclostationary feature detection…”
Get full text
Article -
449
Specification-Based Testing of the Image-Recognition Performance of Automated Driving Systems
Published 2025-01-01Subjects: Get full text
Article -
450
GAD:topology-aware time series anomaly detection
Published 2020-06-01Subjects: Get full text
Article -
451
Business process mining based insider threat detection system
Published 2016-10-01Subjects: Get full text
Article -
452
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Published 2024-08-01Subjects: Get full text
Article -
453
-
454
Performance analysis of topic detection algorithms in distributed environment
Published 2018-08-01Subjects: “…topic detection…”
Get full text
Article -
455
Research on intrusion detection method for edge networks based on federated reinforcement learning
Published 2024-12-01Subjects: Get full text
Article -
456
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Published 2025-12-01Subjects: “…Malware detection…”
Get full text
Article -
457
Synthetic spoofing speech detection method based on center-symmetric local binary pattern
Published 2023-01-01Subjects: Get full text
Article -
458
Spammer detection technology of social network based on graph convolution network
Published 2018-05-01Subjects: Get full text
Article -
459
Multi-layered based network security defense system
Published 2007-01-01Subjects: “…multi-intrusion detection…”
Get full text
Article -
460
DETECTION METHOD FOR CUTTER WEAR OF TBM BASED ON MAGNETOSTATIC EFFECT
Published 2022-01-01Subjects: “…Wear detection…”
Get full text
Article