-
581
KAN-ResNet-Enhanced Radio Frequency Fingerprint Identification with Zero-Forcing Equalization
Published 2025-04-01Get full text
Article -
582
-
583
A Fast Power Market Clearing Method Based on Active Constraints Identification by Deep Learning
Published 2020-09-01“…Secondly, a deep learning strategy is proposed for identification of active constraint sets, which can provide technical support for deep neural networks to effectively identify the active constraints of SCED from two aspects: feature vector design and efficient processing of the results of deep neural network. …”
Get full text
Article -
584
-
585
-
586
-
587
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…One real fingerprint per user is encrypted and stored for authentication, reducing computational complexity. The CNN classifies encrypted features without decryption, ensuring secure authentication. …”
Get full text
Article -
588
Over-the-air federated learning: Status quo, open challenges, and future directions
Published 2025-07-01Get full text
Article -
589
Reversible image steganography based on residual structure and attention mechanism
Published 2025-06-01Get full text
Article -
590
PENGENALAN SUARA MANUSIA MENGGUNAKAN JARINGAN SYARAF TIRUAN DENGAN METODE LINEAR PREDICTIVE CODING DAN FAST FOURIR TRANSFORM
Published 2023-08-01“…The voice signal obtained from the recording results is processed by a computer with the FFT algorithm so that a digital signal is obtained, then parsed, the results of the feature extraction with the FFT method then become the input of the LPC method and then implemented into the Artificial Neural Network. …”
Get full text
Article -
591
A Multicomponent Face Verification and Identification System
Published 2025-07-01Get full text
Article -
592
-
593
Hybrid CNN-LSTM With Attention Mechanism for Robust Credit Card Fraud Detection
Published 2025-01-01Get full text
Article -
594
A Lightweight GCT-EEGNet for EEG-Based Individual Recognition Under Diverse Brain Conditions
Published 2024-10-01Get full text
Article -
595
The Evolution of Biometric Authentication: A Deep Dive Into Multi-Modal Facial Recognition: A Review Case Study
Published 2024-01-01“…The survey highlights novel contributions such as using Generative Adversarial Networks (GANs) to generate synthetic disguised faces, Convolutional Neural Networks (CNNs) for feature extractions, and Fuzzy Extractors to integrate biometric verification with cryptographic security. …”
Get full text
Article -
596
MeetSafe: enhancing robustness against white-box adversarial examples
Published 2025-08-01Get full text
Article -
597
A New Efficient Hybrid Technique for Human Action Recognition Using 2D Conv-RBM and LSTM with Optimized Frame Selection
Published 2025-02-01“…Recognizing human actions through video analysis has gained significant attention in applications like surveillance, sports analytics, and human–computer interaction. While deep learning models such as 3D convolutional neural networks (CNNs) and recurrent neural networks (RNNs) deliver promising results, they often struggle with computational inefficiencies and inadequate spatial–temporal feature extraction, hindering scalability to larger datasets or high-resolution videos. …”
Get full text
Article -
598
-
599
A Semantic Weight Adaptive Model Based on Visual Question Answering
Published 2025-01-01Get full text
Article -
600