-
501
A Human-Centric, Uncertainty-Aware Event-Fused AI Network for Robust Face Recognition in Adverse Conditions
Published 2025-06-01“…Complementing this, an Adaptive Spectral Attention mechanism dynamically reweights each stream to amplify the most reliable facial features in real time. Unlike previous efforts that compartmentalize uncertainty handling, spectral blending, or computational thrift, HUE-Net unites all three in a lightweight package. …”
Get full text
Article -
502
DeepGuard: Enhancing Violence Detection in Smart Cities Through Deep Learning
Published 2025-01-01Get full text
Article -
503
A Hybrid CNN-LSTM Model With Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks
Published 2025-01-01“…The framework’s resilience and adaptability underscore its potential for enhancing network security in real-world IoT applications by addressing evolving threats and computational constraints.…”
Get full text
Article -
504
CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People
Published 2022-01-01“…The application uses MobileNet architecture due to its low computational complexity to run on low-power end devices. …”
Get full text
Article -
505
A multi-view graph neural network approach for magnetic resonance imaging-based diagnosis of knee injuries
Published 2025-01-01Get full text
Article -
506
-
507
A Novel Ensemble of Deep Learning Approach for Cybersecurity Intrusion Detection with Explainable Artificial Intelligence
Published 2025-07-01“…The framework is deployed using a Flask-based web interface in the Amazon Elastic Compute Cloud environment, capturing live network traffic and offering sub-second inference with visual alerts. …”
Get full text
Article -
508
Cryptographic key generation using deep learning with biometric face and finger vein data
Published 2025-04-01Get full text
Article -
509
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
Get full text
Article -
510
DDoS Attack Detection in SDN-Assisted Federated Learning Environment Based on Contrastive Learning
Published 2025-01-01“…Software-defined networking (SDN)-assisted federated learning (FL) is an emerging network computing environment. …”
Get full text
Article -
511
A Novel Dangerous Goods Detection Network Based on Multi-Layer Attention Mechanism in X-Ray Baggage Images
Published 2025-01-01“…The automatic detection of dangerous goods in X-ray baggage images is a crucial task in the field of industrial security. This paper proposes a novel dangerous goods detection network (DGDN) designed to address the challenges of detecting dangerous goods in complex X-ray baggage images. …”
Get full text
Article -
512
-
513
-
514
-
515
-
516
-
517
-
518
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…Current anomaly detection methods in healthcare systems, such as artificial intelligence and big data analytics-intracerebral hemorrhage (AIBDA-ICH) and parallel conformer neural network (PCNN), face several challenges, including high resource consumption, inefficient feature selection, and an inability to handle temporal data effectively for real-time monitoring. …”
Get full text
Article -
519
-
520