-
181
YOLO-Ssboat: Super-Small Ship Detection Network for Large-Scale Aerial and Remote Sensing Scenes
Published 2025-06-01“…Additionally, it employs a high-resolution feature layer and incorporates a Multi-Scale Weighted Pyramid Network (MSWPN) to enhance feature diversity. …”
Get full text
Article -
182
Cyberattack Detection Systems in Industrial Internet of Things (IIoT) Networks in Big Data Environments
Published 2025-03-01Get full text
Article -
183
A Novel Approach to Many-to-Many User Authentication in Different Information Systems
Published 2013-08-01Get full text
Article -
184
SGAK: A Robust ECC-Based Authenticated Key Exchange Protocol for Smart Grid Networks
Published 2024-01-01Get full text
Article -
185
MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS
Published 2022-06-01Get full text
Article -
186
X-FuseRLSTM: A Cross-Domain Explainable Intrusion Detection Framework in IoT Using the Attention-Guided Dual-Path Feature Fusion and Residual LSTM
Published 2025-06-01“…The suggested method is appropriate for practical IoT security applications since it provides strong domain generalization and explainability while preserving computational efficiency.…”
Get full text
Article -
187
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments
Published 2025-07-01“…The Mayfly Optimization Algorithm (MOA) is then utilized for feature selection, effectively mitigating computational complexity. …”
Get full text
Article -
188
Deep Learning Network Selection and Optimized Information Fusion for Enhanced COVID-19 Detection: A Literature Review
Published 2025-07-01“…The rapid spread of COVID-19 increased the need for speedy diagnostic tools, which led scientists to conduct extensive research on deep learning (DL) applications that use chest imaging, such as chest X-ray (CXR) and computed tomography (CT). This review examines the development and performance of DL architectures, notably convolutional neural networks (CNNs) and emerging vision transformers (ViTs), in identifying COVID-19-related lung abnormalities. …”
Get full text
Article -
189
Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms
Published 2025-03-01Get full text
Article -
190
Mapping Grayscale Images to Colour Space Using Deep Learning
Published 2022-03-01Get full text
Article -
191
-
192
-
193
-
194
Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives
Published 2025-04-01Get full text
Article -
195
Optimizing Fingerprint Identification: CNNs With Raw Images Versus Handcrafted Features for Real-Time Systems
Published 2025-01-01“…This study investigates the balance between accuracy and computational efficiency(thereby speed) by comparing two approaches: training a Convolutional Neural Network (CNN) with raw fingerprint images and training a CNN using handcrafted fingerprint features. …”
Get full text
Article -
196
-
197
Robust deepfake detection using Long Short-Term Memory networks for video authentication
Published 2025-03-01Get full text
Article -
198
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
Published 2024-01-01Get full text
Article -
199
A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network
Published 2024-01-01“…To this end, this paper proposes a malware detection method based on genetic algorithm optimization of the CNN-SENet network, which firstly introduces the SENet attention mechanism into the convolutional neural network to enhance the spatial feature extraction capability of the model; then, the application programming interface (API) sequences corresponding to different software behaviors are processed by segmentation and de-duplication, which in turn leads to the sequence feature extraction through the CNN-SENet model; finally, genetic algorithm is used to optimize the hyperparameters of CNN-SENet network to reduce the computational overhead of CNN and to achieve the recognition and classification of different malware at the output layer. …”
Get full text
Article -
200
ABA-IDS: Attention-Based Autoencoder for Intrusion Detection in Assistive Mobility Robotic Network
Published 2025-01-01Get full text
Article