-
781
Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles.
Published 2025-01-01“…When compared to similar schemes, this approach exhibits reduced computational overhead while providing superior security features.…”
Get full text
Article -
782
SwinTCS: A Swin Transformer Approach to Compressive Sensing with Non-Local Denoising
Published 2025-04-01Get full text
Article -
783
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework
Published 2025-07-01“…Cybersecurity includes decreasing the risk of mischievous computer, software, and network attacks. Novel techniques have been combined into emerging artificial intelligence (AI) that attains cybersecurity. …”
Get full text
Article -
784
-
785
Review of malware detection and classification visualization techniques
Published 2023-10-01“…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
Get full text
Article -
786
YOLOv8 framework for COVID-19 and pneumonia detection using synthetic image augmentation
Published 2025-05-01Get full text
Article -
787
-
788
-
789
Robust Face Recognition Using Deep Learning and Ensemble Classification
Published 2025-01-01“…Existing methods often struggle to strike a balance between accuracy, computational efficiency, and robustness. Deep learning has become popular for automatically learning features through convolution layers. …”
Get full text
Article -
790
Advancing Corn Yield Mapping in Kenya Through Transfer Learning
Published 2025-05-01Get full text
Article -
791
Fractional Artificial Protozoa Optimization Enabled Deep Learning for Intrusion Detection and Mitigation in Cyber-Physical Systems
Published 2024-01-01“…CPSs are gradually growing and utilized in important infrastructure and industries for attaining smart grid, smart transportation, and smart healthcare, which assists governments and citizens. Nevertheless, the network and wireless communication technology creates high complexity, and the intelligence and dynamic of network intrusions make CPS more insecure to network intrusions and provide more critical threats to human life and national security. …”
Get full text
Article -
792
-
793
Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection
Published 2025-01-01“…Mobile phones have evolved into powerful handheld computers, fostering a vast application ecosystem but also increasing security and privacy risks. …”
Get full text
Article -
794
DMN-YOLO: A Robust YOLOv11 Model for Detecting Apple Leaf Diseases in Complex Field Conditions
Published 2025-05-01Get full text
Article -
795
Enhancing anomaly detection in plant disease recognition with knowledge ensemble
Published 2025-08-01Get full text
Article -
796
Constructing segmentation method for wheat powdery mildew using deep learning
Published 2025-05-01“…Finally, in the deep bottleneck of Swin-Unet network, ResNet network layers are used to increase the expressive power of feature. …”
Get full text
Article -
797
-
798
Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection
Published 2025-07-01Get full text
Article -
799
-
800
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption
Published 2015-01-01“…Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. …”
Get full text
Article