-
581
Combining Supervised and Reinforcement Learning to Build a Generic Defensive Cyber Agent
Published 2025-05-01Get full text
Article -
582
AnomLite: Efficient binary and multiclass video anomaly detection
Published 2025-03-01Get full text
Article -
583
HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers
Published 2025-04-01“…The findings show that the HoRNS-CNN model effectively manages cipher-image expansion with an asymptotic complexity of $$O\left({n}^{3}\right)$$ O n 3 , offering better performance and faster feature extraction compared to its peers. The model can predict 400,000 neural-biomarker features in one hour, providing an effective tool for analyzing neuroimages while ensuring privacy and security.…”
Get full text
Article -
584
Optimizing Group Activity Recognition With Actor Relation Graphs and GCN-LSTM Architectures
Published 2025-01-01“…The challenge of understanding and recognizing group activities through human behavior and interactions is a prominent issue in the realm of computer vision research. This area boasts a wide range of applications, including security surveillance, healthcare monitoring, and human-computer interaction systems. …”
Get full text
Article -
585
Trajectory-Driven Deep Learning for UAV Location Integrity Checks
Published 2024-01-01Get full text
Article -
586
Efficient productivity prediction model based on edge data compression in smart farms
Published 2025-12-01“…This strategy integrates lightweight edge models and region-aware clippings and compression techniques to reduce data transmission while retaining key agronomic features. Furthermore, the strategy's multi-dimensional resource-aware scheduling and optimized network multiplexing significantly enhance the efficiency of data acquisition and transmission. …”
Get full text
Article -
587
Multi-Modal Comparative Analysis on Audio Dub Detection Using Artificial Intelligence
Published 2025-01-01Get full text
Article -
588
KAN-ResNet-Enhanced Radio Frequency Fingerprint Identification with Zero-Forcing Equalization
Published 2025-04-01Get full text
Article -
589
Optimized disease prediction in healthcare systems using HDBN and CAEN framework
Published 2025-06-01Get full text
Article -
590
-
591
A Fast Power Market Clearing Method Based on Active Constraints Identification by Deep Learning
Published 2020-09-01“…Secondly, a deep learning strategy is proposed for identification of active constraint sets, which can provide technical support for deep neural networks to effectively identify the active constraints of SCED from two aspects: feature vector design and efficient processing of the results of deep neural network. …”
Get full text
Article -
592
-
593
Over-the-air federated learning: Status quo, open challenges, and future directions
Published 2025-07-01Get full text
Article -
594
DaGAM-Trans: Dual graph attention module-based transformer for offline signature forgery detection
Published 2025-09-01Get full text
Article -
595
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…One real fingerprint per user is encrypted and stored for authentication, reducing computational complexity. The CNN classifies encrypted features without decryption, ensuring secure authentication. …”
Get full text
Article -
596
Deep learning based bio-metric authentication system using a high temporal/frequency resolution transform
Published 2024-12-01Get full text
Article -
597
Smart Real-time Attendance System for Nigerian Universities
Published 2025-01-01Get full text
Article -
598
Sustainable AI for plant disease classification using ResNet18 in few-shot learning
Published 2025-07-01Get full text
Article -
599
-
600
The Evolution of Biometric Authentication: A Deep Dive Into Multi-Modal Facial Recognition: A Review Case Study
Published 2024-01-01“…The survey highlights novel contributions such as using Generative Adversarial Networks (GANs) to generate synthetic disguised faces, Convolutional Neural Networks (CNNs) for feature extractions, and Fuzzy Extractors to integrate biometric verification with cryptographic security. …”
Get full text
Article