-
501
A Human-Centric, Uncertainty-Aware Event-Fused AI Network for Robust Face Recognition in Adverse Conditions
Published 2025-06-01“…Complementing this, an Adaptive Spectral Attention mechanism dynamically reweights each stream to amplify the most reliable facial features in real time. Unlike previous efforts that compartmentalize uncertainty handling, spectral blending, or computational thrift, HUE-Net unites all three in a lightweight package. …”
Get full text
Article -
502
DeepGuard: Enhancing Violence Detection in Smart Cities Through Deep Learning
Published 2025-01-01Get full text
Article -
503
A Hybrid CNN-LSTM Model With Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks
Published 2025-01-01“…The framework’s resilience and adaptability underscore its potential for enhancing network security in real-world IoT applications by addressing evolving threats and computational constraints.…”
Get full text
Article -
504
CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People
Published 2022-01-01“…For object detection and recognition, a deep Convolution Neural Network (CNN) model is employed with an accuracy of 83.3%, whereas the dataset contains more than 1000 categories. …”
Get full text
Article -
505
A multi-view graph neural network approach for magnetic resonance imaging-based diagnosis of knee injuries
Published 2025-01-01Get full text
Article -
506
-
507
A Novel Ensemble of Deep Learning Approach for Cybersecurity Intrusion Detection with Explainable Artificial Intelligence
Published 2025-07-01“…The framework is deployed using a Flask-based web interface in the Amazon Elastic Compute Cloud environment, capturing live network traffic and offering sub-second inference with visual alerts. …”
Get full text
Article -
508
Cryptographic key generation using deep learning with biometric face and finger vein data
Published 2025-04-01Get full text
Article -
509
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
Get full text
Article -
510
DDoS Attack Detection in SDN-Assisted Federated Learning Environment Based on Contrastive Learning
Published 2025-01-01“…Software-defined networking (SDN)-assisted federated learning (FL) is an emerging network computing environment. …”
Get full text
Article -
511
A Novel Dangerous Goods Detection Network Based on Multi-Layer Attention Mechanism in X-Ray Baggage Images
Published 2025-01-01“…In the network, a multilevel refinement (MR) module is designed to improve multi-level feature representation, enabling the network to capture varied goods sizes and overlapping structures effectively. …”
Get full text
Article -
512
-
513
-
514
-
515
-
516
-
517
-
518
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…Current anomaly detection methods in healthcare systems, such as artificial intelligence and big data analytics-intracerebral hemorrhage (AIBDA-ICH) and parallel conformer neural network (PCNN), face several challenges, including high resource consumption, inefficient feature selection, and an inability to handle temporal data effectively for real-time monitoring. …”
Get full text
Article -
519
-
520