-
101
-
102
Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs
Published 2025-06-01“…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
Get full text
Article -
103
Software with artificial intelligence-derived algorithms for detecting and analysing lung nodules in CT scans: systematic review and economic evaluation
Published 2025-05-01“…Information required to populate the models included the prevalence of lung nodules, risk of lung cancer with different nodule sizes, sensitivity and specificity for nodule detection, nodule type and size distributions in different population, resource use, costs and utilities. …”
Get full text
Article -
104
Vehicle detection method based on multi-layer selective feature for UAV aerial images
Published 2025-07-01“…For the detection head, a Generalized Wasserstein Distance Loss (GWDLoss) function is proposed to quantify positional and scale discrepancies, improving the adaptability of bounding box regression to geometric variations. …”
Get full text
Article -
105
-
106
THE SUCCESS OF SATELLITE GRAVIMETRY IN GEOPHYSICAL INVESTIGATIONS
Published 2024-03-01“…The successful geophysical researches carried out using satellite acquired gravity data from existing literature were also discussed. …”
Get full text
Article -
107
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
108
Segmentation-Based Detection for Luffa Seedling Grading Using the Seg-FL Model
Published 2024-10-01Get full text
Article -
109
DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model
Published 2024-11-01“…Achieving real-time detection with high accuracy, while accommodating the limited resources of edge-computing devices poses a significant challenge for anti-UAV detection. …”
Get full text
Article -
110
An Improved Diagnosis Approach for Short-Circuit Fault Diagnosis in MPC-Based Current Source Inverter System
Published 2025-01-01“…Due to its excellent dynamic performance, the model predictive current control (MPC) method is widely adopted in power inverter systems, such as current source inverters (CSI). However, short-circuit faults in power switches are common in CSI systems, leading to a periodic output current distortion. …”
Get full text
Article -
111
Leveraging Multimodal Large Language Models (MLLMs) for Enhanced Object Detection and Scene Understanding in Thermal Images for Autonomous Driving Systems
Published 2024-10-01“…Two primary research questions are addressed: the capacity of these models to detect and enumerate objects within thermal images, and to determine whether pairs of image sources represent the same scene. …”
Get full text
Article -
112
Attraction and aversion of noctuid moths to fermented food sources coordinated by olfactory receptors from distinct gene families
Published 2025-01-01“…Conclusions Our findings suggest that this functional conservation is an olfactory adaptation that has allowed noctuid moths to extend their diet to fermented food sources.…”
Get full text
Article -
113
-
114
Dual‐Function Ceramic Pigments for Energy‐Efficient and Secure Autonomous Vehicles
Published 2025-07-01“…Consequently, a bi‐function ceramic pigment (BFCP) is fabricated with both superior RC performance and heightened LiDAR detectability compared to commercial pigments. …”
Get full text
Article -
115
-
116
Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection
Published 2025-07-01“…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
Get full text
Article -
117
Scalable Electrochemical Synthesis of Novel Biogenic Silver Nanoparticles and Its Application to High-Sensitive Detection of 4-Nitrophenol in Aqueous System
Published 2021-01-01“…The biogenic AgNPs-SPE is applied successfully to the detection of 4-nitrophenol (4-NP). …”
Get full text
Article -
118
-
119
Regional Frequency Analysis Using L-Moments for Determining Daily Rainfall Probability Distribution Function and Estimating the Annual Wastewater Discharges
Published 2025-06-01“…In the evaluation of the prediction capacity, the selected cluster of 7 stations performed in the first quartile of the 120 possible combinations of 7 stations, both for the detection of the occurrence of rainfall—in terms of Probability of Detection (POD), False Alarm Ratio (FAR), Critical Success Index (CSI) and Bias Score (BS) statistics—and for the accuracy of rainfall—according to Root Mean Square Error (RMSE), Nash–Sutcliffe Efficiency coefficient (NSE) and Percent Bias (PBIAS). …”
Get full text
Article -
120