-
241
Comparative analysis of impact of classification algorithms on security and performance bug reports
Published 2024-12-01Get full text
Article -
242
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
Published 2025-05-01“…Addressing these limitations is crucial for ensuring reliable biometric security in real-world applications, including law enforcement, financial transactions, and border security. …”
Get full text
Article -
243
-
244
-
245
-
246
CRIMINOLOGICAL FEATURES ORGANIZED COUNTERFEITING IN THE DIGITAL AGE
Published 2023-09-01Get full text
Article -
247
Deep Fusion Intelligence: Enhancing 5G Security Against Over-the-Air Attacks
Published 2025-01-01Get full text
Article -
248
Efficient Malware Classification using Transfer Learning and Stacked Ensemble Techniques
Published 2025-08-01Get full text
Article -
249
A Novel Framework for Quantum-Enhanced Federated Learning with Edge Computing for Advanced Pain Assessment Using ECG Signals via Continuous Wavelet Transform Images
Published 2025-02-01“…The cornerstone of our system is a Quantum Convolutional Hybrid Neural Network (QCHNN) that harnesses quantum entanglement properties to enhance feature detection and classification robustness. …”
Get full text
Article -
250
Robust Network Traffic Classification Based on Information Bottleneck Neural Network
Published 2024-01-01Get full text
Article -
251
Research on Lightweight Model of Multi-person Pose Estimation Based on Improved YOLOv8s-Pose
Published 2025-03-01Get full text
Article -
252
SH-SDS: a new static-dynamic strategy for substation host security detection
Published 2024-11-01Get full text
Article -
253
-
254
Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices
Published 2015-06-01Get full text
Article -
255
A survey on secure communication technologies for smart grid cyber physical system
Published 2024-12-01“…A CPS combines physical components, computational elements, and communication networks. The smart grid CPS (SG-CPS) is an example of such a system, featuring physical devices with diverse communication needs and intermediary networks. …”
Get full text
Article -
256
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…Finally, the model also makes use of a novel leaf-cut feature optimization strategy and tight adaptive cloud edge intelligence to achieve high accuracy while minimizing memory and computation demand. …”
Get full text
Article -
257
GFADE: generalized feature adaptation and discrimination enhancement for deepfake detection
Published 2025-05-01Get full text
Article -
258
Regional Short‐Term Wind Power Prediction Based on CEEMDAN‐FTC Feature Mapping and EC‐TCN‐BiLSTM Deep Learning
Published 2025-06-01“…Third, by combining the strengths of TCN and BiLSTM neural networks, the temporal and spatial correlations of input features can be captured effectively. …”
Get full text
Article -
259
Machine learning based intrusion detection framework for detecting security attacks in internet of things
Published 2024-12-01“…Thus, to solve this issue, herein, we propose an advance Intrusion detection framework using Self-Attention Progressive Generative Adversarial Network (SAPGAN) framework for detecting security threats in IoT networks. …”
Get full text
Article -
260
Ultra Wideband radar-based gait analysis for gender classification using artificial intelligence
Published 2025-09-01“…Gender classification plays a vital role in various applications, particularly in security and healthcare. While several biometric methods such as facial recognition, voice analysis, activity monitoring, and gait recognition are commonly used, their accuracy and reliability often suffer due to challenges like body part occlusion, high computational costs, and recognition errors. …”
Get full text
Article