-
581
A Fast Power Market Clearing Method Based on Active Constraints Identification by Deep Learning
Published 2020-09-01“…Secondly, a deep learning strategy is proposed for identification of active constraint sets, which can provide technical support for deep neural networks to effectively identify the active constraints of SCED from two aspects: feature vector design and efficient processing of the results of deep neural network. …”
Get full text
Article -
582
GSIDroid: A Suspicious Subgraph-Driven and Interpretable Android Malware Detection System
Published 2025-07-01Get full text
Article -
583
-
584
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…One real fingerprint per user is encrypted and stored for authentication, reducing computational complexity. The CNN classifies encrypted features without decryption, ensuring secure authentication. …”
Get full text
Article -
585
Over-the-air federated learning: Status quo, open challenges, and future directions
Published 2025-07-01Get full text
Article -
586
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
Published 2023-01-01Get full text
Article -
587
Detecting Zero-Day Web Attacks with an Ensemble of LSTM, GRU, and Stacked Autoencoders
Published 2025-05-01Get full text
Article -
588
A novel encrypted traffic detection model based on detachable convolutional GCN-LSTM
Published 2025-07-01Get full text
Article -
589
Jordanian banknote data recognition: A CNN-based approach with attention mechanism
Published 2024-04-01Get full text
Article -
590
Deep Learning-Based Fingerprint–Vein Biometric Fusion: A Systematic Review with Empirical Evaluation
Published 2025-07-01Get full text
Article -
591
U-Net-based VGG19 model for improved facial expression recognition
Published 2025-06-01“…The improved model not only boosts performance in terms of feature extraction and fusion but is also adept in solving the pressing problems of parameter size and computational efficiency. …”
Get full text
Article -
592
-
593
Mitigating Online Banking Fraud Using Machine Learning and Anomaly Detection
Published 2025-06-01Get full text
Article -
594
A New Efficient Hybrid Technique for Human Action Recognition Using 2D Conv-RBM and LSTM with Optimized Frame Selection
Published 2025-02-01“…Recognizing human actions through video analysis has gained significant attention in applications like surveillance, sports analytics, and human–computer interaction. While deep learning models such as 3D convolutional neural networks (CNNs) and recurrent neural networks (RNNs) deliver promising results, they often struggle with computational inefficiencies and inadequate spatial–temporal feature extraction, hindering scalability to larger datasets or high-resolution videos. …”
Get full text
Article -
595
A Semantic Weight Adaptive Model Based on Visual Question Answering
Published 2025-01-01Get full text
Article -
596
The Evolution of Biometric Authentication: A Deep Dive Into Multi-Modal Facial Recognition: A Review Case Study
Published 2024-01-01“…The survey highlights novel contributions such as using Generative Adversarial Networks (GANs) to generate synthetic disguised faces, Convolutional Neural Networks (CNNs) for feature extractions, and Fuzzy Extractors to integrate biometric verification with cryptographic security. …”
Get full text
Article -
597
Lightweight Attention-Based CNN Architecture for CSI Feedback of RIS-Assisted MISO Systems
Published 2025-07-01Get full text
Article -
598
Leveraging machine learning to proactively identify phishing campaigns before they strike
Published 2025-05-01Get full text
Article -
599
-
600
Smart intrusion detection model to identify unknown attacks for improved road safety and management
Published 2025-05-01“…ACIDS integrates convolutional neural networks (CNN) for hierarchical feature extraction, the synthetic minority over-sampling technique (SMOTE) to address class imbalance and an open-set classification framework to detect novel attack patterns. …”
Get full text
Article