-
721
Attention-based multi-scale convolution and conformer for EEG-based depression detection
Published 2025-07-01Get full text
Article -
722
-
723
-
724
Continuous Gesture Sequences Recognition Based on Few-Shot Learning
Published 2022-01-01“…The scheme uses Mediapipe to detect the key points of each frame in the video stream, decomposes the basic components of gesture features based on certain human palm structure, and then extracts and combines the above basic gesture features by a lightweight autoencoder network. …”
Get full text
Article -
725
An ECoG-Based Binary Classification of BCI Using Optimized Extreme Learning Machine
Published 2020-01-01Get full text
Article -
726
Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors
Published 2025-04-01“…This research proposes a hybrid deep learning framework that combines techniques from computer vision and sequence modeling, namely, ViT-inspired patch extraction, multi-head attention, and BiLSTM networks, to authenticate users continuously from smartphone sensor data. …”
Get full text
Article -
727
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01Get full text
Article -
728
EmotionNet-X: An Optimized CNN Architecture for Robust Facial Emotion Analysis
Published 2025-01-01“…Facial emotions are expressions of people’s inner feelings. A computer’s ability to recognize emotions is known as emotion recognition (ER), which involves extracting facial characteristics or expressions from a person’s face in order to enable the computer to communicate emotionally with them. …”
Get full text
Article -
729
Structure-Enhanced Prompt Learning for Graph-Based Code Vulnerability Detection
Published 2025-05-01Get full text
Article -
730
Ensemble Voting for Enhanced Robustness in DarkNet Traffic Detection
Published 2024-01-01“…The increasing prevalence of DarkNet traffic poses significant challenges for network security. Despite improvements in machine learning techniques, most of the existing studies have not applied appropriate ensemble voting models on newer datasets like CIC-Darknet 2020. …”
Get full text
Article -
731
-
732
Characteristics of Port Scan Traffic: A Case Study Using Nmap
Published 2025-01-01Get full text
Article -
733
Nystromformer based cross-modality transformer for visible-infrared person re-identification
Published 2025-05-01Get full text
Article -
734
A Reinforcement Learning Approach Combined With Scope Loss Function for Crime Prediction on Twitter (X)
Published 2024-01-01Get full text
Article -
735
NeuroTutor: Neural Decoding of Student Engagement During Virtual and Robotic Tutoring
Published 2025-01-01Get full text
Article -
736
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
Published 2025-03-01Get full text
Article -
737
-
738
Smart Grid System Based on Blockchain Technology for Enhancing Trust and Preventing Counterfeiting Issues
Published 2025-07-01Get full text
Article -
739
MHOE-DETR: A Ship Detection Method for Small and Fuzzy Targets Based on Satellite Remote Sensing Image Data
Published 2025-01-01Get full text
Article -
740
ED-Swin Transformer: A Cassava Disease Classification Model Integrated with UAV Images
Published 2025-04-01Get full text
Article