-
121
Encrypted Image Retrieval System based on Features Analysis
Published 2018-07-01“…However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. …”
Get full text
Article -
122
A Proactive Model for Intrusion Detection Using Image Representation of Network Flows
Published 2024-01-01Get full text
Article -
123
IMpc-PyrYOLO: Hybrid YOLO Based Feature Pyramidal Network for Pest Detection in Rice Leaves
Published 2025-06-01“…The model integrates an efficient channel attention (ECA) mechanism with the feature pyramidal network (FPN) in the YOLO network to improve multi-scale feature extraction and pest classification accuracy. …”
Get full text
Article -
124
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data
Published 2013-03-01Get full text
Article -
125
-
126
Encrypted malicious traffic detection based on neural network
Published 2025-03-01Get full text
Article -
127
Efficient IDS for IoT Networks Using Host-Based Data Aggregation and Multi-Entropy Analysis
Published 2025-01-01Get full text
Article -
128
Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
Published 2024-11-01“…Therefore, developing a secure IoT system is vital, shielding against attackers leveraging IoT devices to obtain network access and maintaining data security during transmission between these devices. …”
Get full text
Article -
129
Multiscale Two-Stream Fusion Network for Benggang Classification in Multi-Source Images
Published 2025-05-01Get full text
Article -
130
An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms
Published 2025-05-01“…Abstract In Industrial Internet of Things (IIoT) networks, securing device connectivity through effective intrusion detection systems is essential for maintaining operational integrity. …”
Get full text
Article -
131
CSTAN: A Deepfake Detection Network with CST Attention for Superior Generalization
Published 2024-11-01Get full text
Article -
132
A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network
Published 2025-03-01“…In this sense, this paper proposes a topology-guided high-quality solution learning framework based on graph convolutional network (GCN) and neighborhood search (NS). Firstly, a GCN-based method is presented to learn the potential patterns between commitments and graph data associated with bus feature and power grid topology. …”
Get full text
Article -
133
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…With the maturation of computer graphics (CG) technology in the field of image generation, the realism of created images has been improved significantly. …”
Get full text
Article -
134
-
135
Bankruptcy forecasting in enterprises and its security using hybrid deep learning models
Published 2025-12-01Get full text
Article -
136
-
137
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01Get full text
Article -
138
Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design
Published 2025-07-01Get full text
Article -
139
SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training
Published 2025-07-01“…Network intrusion detection systems, as a fundamental part of network security, have become increasingly significant. …”
Get full text
Article -
140