-
761
-
762
Structure-Enhanced Prompt Learning for Graph-Based Code Vulnerability Detection
Published 2025-05-01Get full text
Article -
763
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
Published 2025-03-01Get full text
Article -
764
Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm
Published 2014-01-01“…The number of mobile devices used globally substantially increases daily; therefore, information security concerns are increasingly vital. The botnet virus is a major threat to both personal computers and mobile devices; therefore, a method of botnet feature characterization is proposed in this study. …”
Get full text
Article -
765
Smart Grid System Based on Blockchain Technology for Enhancing Trust and Preventing Counterfeiting Issues
Published 2025-07-01Get full text
Article -
766
YOLOv8 framework for COVID-19 and pneumonia detection using synthetic image augmentation
Published 2025-05-01Get full text
Article -
767
EmotionNet-X: An Optimized CNN Architecture for Robust Facial Emotion Analysis
Published 2025-01-01“…Facial emotions are expressions of people’s inner feelings. A computer’s ability to recognize emotions is known as emotion recognition (ER), which involves extracting facial characteristics or expressions from a person’s face in order to enable the computer to communicate emotionally with them. …”
Get full text
Article -
768
Review of malware detection and classification visualization techniques
Published 2023-10-01“…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
Get full text
Article -
769
ED-Swin Transformer: A Cassava Disease Classification Model Integrated with UAV Images
Published 2025-04-01Get full text
Article -
770
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework
Published 2025-07-01“…Cybersecurity includes decreasing the risk of mischievous computer, software, and network attacks. Novel techniques have been combined into emerging artificial intelligence (AI) that attains cybersecurity. …”
Get full text
Article -
771
DCSLK: Combined large kernel shared convolutional model with dynamic channel Sampling
Published 2025-07-01Get full text
Article -
772
-
773
Fractional Artificial Protozoa Optimization Enabled Deep Learning for Intrusion Detection and Mitigation in Cyber-Physical Systems
Published 2024-01-01“…CPSs are gradually growing and utilized in important infrastructure and industries for attaining smart grid, smart transportation, and smart healthcare, which assists governments and citizens. Nevertheless, the network and wireless communication technology creates high complexity, and the intelligence and dynamic of network intrusions make CPS more insecure to network intrusions and provide more critical threats to human life and national security. …”
Get full text
Article -
774
A Reinforcement Learning Approach Combined With Scope Loss Function for Crime Prediction on Twitter (X)
Published 2024-01-01Get full text
Article -
775
Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning
Published 2025-07-01“…In this study, we introduced an interdisciplinary framework that aims to enhance network intrusion detection systems (NIDSs). In this framework, we introduced an IDS via feature selection and feature reduction technique(s) with the attention-driven lightweight deep neural networks: Deep Recurrent Neural Networks (RNN), Deep Long Short-Term Memory (LSTM), and Deep Bi-directional Long Short-Term Memory (Bi-LSTM). …”
Get full text
Article -
776
DMN-YOLO: A Robust YOLOv11 Model for Detecting Apple Leaf Diseases in Complex Field Conditions
Published 2025-05-01Get full text
Article -
777
Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning
Published 2025-03-01Get full text
Article -
778
A New Hybrid ConvViT Model for Dangerous Farm Insect Detection
Published 2025-02-01Get full text
Article -
779
Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection
Published 2025-07-01Get full text
Article -
780
Advancing Corn Yield Mapping in Kenya Through Transfer Learning
Published 2025-05-01Get full text
Article