-
481
-
482
-
483
-
484
MVCG-SPS: A Multi-View Contrastive Graph Neural Network for Smart Ponzi Scheme Detection
Published 2025-03-01Get full text
Article -
485
-
486
-
487
Optimal Partitioning of Unbalanced Datasets for BGP Anomaly Detection
Published 2025-04-01Get full text
Article -
488
Unseen Attack Detection in Software-Defined Networking Using a BERT-Based Large Language Model
Published 2025-07-01“…By utilizing Random Forest for feature selection, we optimize model performance and reduce computational overhead, ensuring efficient and accurate detection. …”
Get full text
Article -
489
Deep Learning Approach for Classifying DDoS Attack Traffic in SDN Environments
Published 2024-12-01Get full text
Article -
490
HSTCN-NuSVC: A Homogeneous Stacked Deep Ensemble Learner for Classifying Human Actions Using Smartphones
Published 2025-02-01“…Smartphone-based human activity recognition (HAR) is an important research area due to its wide-ranging applications in health, security, gaming, etc. Existing HAR models face challenges such as tedious manual feature extraction/selection techniques, limited model generalisation, high computational cost, and inability to retain longer-term dependencies. …”
Get full text
Article -
491
-
492
Improved Crime Prediction Using Hybrid Neural Architecture Search Together with Hyperparameter Tuning
Published 2025-07-01Get full text
Article -
493
RIM-Net: A Real-Imaginary-Magnitude Network for NLOS/LOS Identification in UWB Indoor Positioning Systems
Published 2025-01-01Get full text
Article -
494
Research on Small-Sample Credit Card Fraud Identification Based on Temporal Attention-Boundary-Enhanced Prototype Network
Published 2024-12-01“…Additionally, nearest-neighbor boundary loss is introduced after the computation of the prototype-like network model to adjust the overall distribution of features in the metric space and to clarify the representation boundaries of the prototype-like model. …”
Get full text
Article -
495
Highly accurate anomaly based intrusion detection through integration of the local outlier factor and convolutional neural network
Published 2025-07-01“…Abstract Intrusion detection systems (IDS) are critical for safeguarding computer networks by identifying malicious activities. …”
Get full text
Article -
496
MT-SiamNet: A Multi-Scale Attention Network for Reducing Missed Detections in Farmland Change Detection
Published 2025-03-01Get full text
Article -
497
A novel framework GRCornShot for corn disease detection using few shot learning with prototypical network
Published 2025-07-01Get full text
Article -
498
Exploring Synergy of Denoising and Distillation: Novel Method for Efficient Adversarial Defense
Published 2024-11-01Get full text
Article -
499
Digits Recognition for Arabic Handwritten through Convolutional Neural Networks, Local Binary Patterns, and Histogram of Oriented Gradients
Published 2024-10-01“…In addition, a Histogram of Oriented Gradients (HOG) is a feature extraction technique that is used in computer vision and image processing for the purpose of object detection. …”
Get full text
Article -
500
Hybrid Machine Learning-Based Multi-Stage Framework for Detection of Credit Card Anomalies and Fraud
Published 2025-01-01Get full text
Article