-
241
Regional Short‐Term Wind Power Prediction Based on CEEMDAN‐FTC Feature Mapping and EC‐TCN‐BiLSTM Deep Learning
Published 2025-06-01“…Third, by combining the strengths of TCN and BiLSTM neural networks, the temporal and spatial correlations of input features can be captured effectively. …”
Get full text
Article -
242
Comparative analysis of impact of classification algorithms on security and performance bug reports
Published 2024-12-01Get full text
Article -
243
A hybrid model for fake news detection: Leveraging news content and user comments in fake news
Published 2021-03-01Get full text
Article -
244
Security monitoring via sound analysis and voice identification with artificial intelligence
Published 2024-08-01“…Successful correct recognition of the test voice profiles on access and security personalization with a quantitative equivalent of 100.0 % accuracy was achieved in the Linear transfer function for Cascade-Forward Neural Networks. …”
Get full text
Article -
245
HCAP: Hybrid cyber attack prediction model for securing healthcare applications.
Published 2025-01-01“…The extracted features are fed into the lion-optimization technique to fine-tune the hyperparameters of the recurrent neural networks, enhancing the model's ability to efficiently predict cybersecurity threats with a maximum recognition rate in IoMT environments. …”
Get full text
Article -
246
-
247
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
Published 2025-05-01“…Addressing these limitations is crucial for ensuring reliable biometric security in real-world applications, including law enforcement, financial transactions, and border security. …”
Get full text
Article -
248
DynBlock: dynamic data encryption with Toffoli gate for IoT
Published 2025-05-01“…We evaluate DynBlock with both 3 and 5 rounds to assess its security and computational efficiency. While the 5-round configuration offers stronger resistance to cryptanalytic attacks, the 3-round setup already delivers robust security, featuring high entropy and a strong avalanche effect, making it well-suited for resource-constrained environments. …”
Get full text
Article -
249
CRIMINOLOGICAL FEATURES ORGANIZED COUNTERFEITING IN THE DIGITAL AGE
Published 2023-09-01Get full text
Article -
250
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
251
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
252
Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives
Published 2025-04-01Get full text
Article -
253
A Cloud User Anomaly Detection Method Based on Mouse Behavior
Published 2019-08-01Get full text
Article -
254
Deep Fusion Intelligence: Enhancing 5G Security Against Over-the-Air Attacks
Published 2025-01-01Get full text
Article -
255
A High-Performance and Lightweight Maritime Target Detection Algorithm
Published 2025-03-01Get full text
Article -
256
A lightweight speaker verification approach for autonomous vehicles
Published 2024-12-01Get full text
Article -
257
SH-SDS: a new static-dynamic strategy for substation host security detection
Published 2024-11-01Get full text
Article -
258
Mapping Grayscale Images to Colour Space Using Deep Learning
Published 2022-03-01Get full text
Article -
259
Robust Network Traffic Classification Based on Information Bottleneck Neural Network
Published 2024-01-01Get full text
Article -
260