-
681
Ensemble Method for Anomaly Detection On the Internet of Things
Published 2024-01-01Get full text
Article -
682
Large–Small-Scale Structure Blended U-Net for Brightening Low-Light Images
Published 2025-05-01Get full text
Article -
683
Multi-anchor adaptive fusion and bi-focus attention for enhanced gait-based emotion recognition
Published 2025-04-01Get full text
Article -
684
GEAAD: generating evasive adversarial attacks against android malware defense
Published 2025-04-01Get full text
Article -
685
A Survey on Android Malware Detection Techniques Using Supervised Machine Learning
Published 2024-01-01Get full text
Article -
686
Adaptive Anomaly Detection Framework Model Objects in Cyberspace
Published 2020-01-01“…Accordingly, the monitoring of computers and networks is too complicated for network administrators. …”
Get full text
Article -
687
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01Get full text
Article -
688
DeepGuard: real-time threat recognition using Golden Jackal optimization with deep learning model
Published 2025-04-01Get full text
Article -
689
YOLOT: Multi-scale and diverse tire sidewall text region detection based on You-Only-Look-Once(YOLOv5)
Published 2024-01-01Get full text
Article -
690
Interpretable Learning Method Based on Causal Interactive Attention
Published 2025-01-01Get full text
Article -
691
An Interpretable Method for Anomaly Detection in Multivariate Time Series Predictions
Published 2025-07-01Get full text
Article -
692
-
693
A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Published 2024-01-01“…Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. …”
Get full text
Article -
694
UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication
Published 2018-01-01“…Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. …”
Get full text
Article -
695
A hybrid super learner ensemble for phishing detection on mobile devices
Published 2025-05-01“…Abstract In today’s digital age, the rapid increase in online users and massive network traffic has made ensuring security more challenging. …”
Get full text
Article -
696
Two-Stage Video Violence Detection Framework Using GMFlow and CBAM-Enhanced ResNet3D
Published 2025-04-01Get full text
Article -
697
Historical Blurry Video-Based Face Recognition
Published 2024-09-01“…Face recognition is a widely used computer vision, which plays an increasingly important role in user authentication systems, security systems, and consumer electronics. …”
Get full text
Article -
698
-
699
-
700
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
Published 2025-01-01“…Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. …”
Get full text
Article