-
681
Ensemble Method for Anomaly Detection On the Internet of Things
Published 2024-01-01Get full text
Article -
682
A Survey on Android Malware Detection Techniques Using Supervised Machine Learning
Published 2024-01-01Get full text
Article -
683
DeepGuard: real-time threat recognition using Golden Jackal optimization with deep learning model
Published 2025-04-01Get full text
Article -
684
An Interpretable Method for Anomaly Detection in Multivariate Time Series Predictions
Published 2025-07-01Get full text
Article -
685
-
686
Multi-anchor adaptive fusion and bi-focus attention for enhanced gait-based emotion recognition
Published 2025-04-01Get full text
Article -
687
-
688
GEAAD: generating evasive adversarial attacks against android malware defense
Published 2025-04-01Get full text
Article -
689
Interpretable Learning Method Based on Causal Interactive Attention
Published 2025-01-01Get full text
Article -
690
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
Published 2025-01-01“…Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. …”
Get full text
Article -
691
UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication
Published 2018-01-01“…Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. …”
Get full text
Article -
692
A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Published 2024-01-01“…Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. …”
Get full text
Article -
693
Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives
Published 2021-01-01“…Few major reasons for using the Blockchain in healthcare systems are its prominent features, i.e., Decentralization, Immutability, Security and Privacy, and Transparency. …”
Get full text
Article -
694
A Reinforcement Learning Approach Combined With Scope Loss Function for Crime Prediction on Twitter (X)
Published 2024-01-01Get full text
Article -
695
EmotionNet-X: An Optimized CNN Architecture for Robust Facial Emotion Analysis
Published 2025-01-01“…Facial emotions are expressions of people’s inner feelings. A computer’s ability to recognize emotions is known as emotion recognition (ER), which involves extracting facial characteristics or expressions from a person’s face in order to enable the computer to communicate emotionally with them. …”
Get full text
Article -
696
Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors
Published 2025-04-01“…This research proposes a hybrid deep learning framework that combines techniques from computer vision and sequence modeling, namely, ViT-inspired patch extraction, multi-head attention, and BiLSTM networks, to authenticate users continuously from smartphone sensor data. …”
Get full text
Article -
697
Large–Small-Scale Structure Blended U-Net for Brightening Low-Light Images
Published 2025-05-01Get full text
Article -
698
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01Get full text
Article -
699
-
700
Adaptive Anomaly Detection Framework Model Objects in Cyberspace
Published 2020-01-01“…Accordingly, the monitoring of computers and networks is too complicated for network administrators. …”
Get full text
Article