-
321
-
322
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01“…This method can detect and reconstruct the feature representation of the possible triggers used in attacking the neural network. …”
Get full text
Article -
323
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
Published 2025-12-01Get full text
Article -
324
Physical layer security analysis using radio frequency‐fingerprinting in cellular‐V2X for 6G communication
Published 2023-05-01Get full text
Article -
325
-
326
MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION
Published 2025-03-01“…Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to present a novel approach for MITM threat identification. …”
Get full text
Article -
327
Key Technology of Communication Equipment Fingerprint Recognition Based on Intelligent Feature Extraction Algorithm
Published 2022-01-01“…The technology is of great significance in electronic countermeasures, wireless network security, and other fields and has been widely studied in recent years. …”
Get full text
Article -
328
From Neural Networks to Emotional Networks: A Systematic Review of EEG-Based Emotion Recognition in Cognitive Neuroscience and Real-World Applications
Published 2025-02-01“…Further, related ethical issues with respect to privacy, data security, and machine learning model biases need to be much more proclaimed to responsibly apply research on emotions to areas such as healthcare, human–computer interaction, and marketing. …”
Get full text
Article -
329
A systematic review of features and content quality of Arabic mental mHealth apps
Published 2024-12-01Get full text
Article -
330
-
331
Enhancing Security in CPS Industry 5.0 using Lightweight MobileNetV3 with Adaptive Optimization Technique
Published 2025-05-01“…The strategy guarantees strong protection for industrial processes in a networked, intelligent environment. This study offers a sophisticated paradigm for improving Cyber-Physical Systems (CPS) security in Industry 5.0 by combining effective data preprocessing, thin edge computing, and strong encryption methods. …”
Get full text
Article -
332
Elastic regularization networks for enhanced UAV visual tracking
Published 2025-07-01Get full text
Article -
333
-
334
Design and implementation of J2EE-based statement feature recognition in English teaching system optimization
Published 2024-12-01“…With the development of Internet technology, network English teaching system came into being and developed rapidly. …”
Get full text
Article -
335
A novel federated learning approach for IoT botnet intrusion detection using SHAP-based knowledge distillation
Published 2025-08-01“…Each IoT client trains locally on its unique, heterogeneous data, computes SHAP values to quantify feature relevance, and shares only distilled feature knowledge with the central server. …”
Get full text
Article -
336
Steganalysis Using KL Transform and Radial Basis Neural Network
Published 2012-07-01Get full text
Article -
337
Cucumber Leaf Segmentation Based on Bilayer Convolutional Network
Published 2024-11-01Get full text
Article -
338
An Ensemble of Convolutional Neural Networks for Sound Event Detection
Published 2025-05-01“…One of the important directions in this field is to detect the sounds of emotional events around residential buildings in smart cities and quickly assess the situation for security purposes. This research presents a comprehensive study of an ensemble convolutional recurrent neural network (CRNN) model designed for sound event detection (SED) in residential and public safety contexts. …”
Get full text
Article -
339
-
340
An Intelligent Ensemble-Based Detection of In-Vehicle Network Intrusion
Published 2025-06-01Get full text
Article