-
721
-
722
-
723
AD-VAE: Adversarial Disentangling Variational Autoencoder
Published 2025-03-01Get full text
Article -
724
A New Hybrid ConvViT Model for Dangerous Farm Insect Detection
Published 2025-02-01Get full text
Article -
725
-
726
Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning
Published 2025-03-01Get full text
Article -
727
A mutual exclusion key pairing scheme for preserving the privacy of channel shared 5G users
Published 2025-06-01Get full text
Article -
728
Robust zero-watermarking for color images using hybrid deep learning models and encryption
Published 2025-08-01Get full text
Article -
729
Knowledge Graph Representation Fusion Framework for Fine-Grained Object Recognition in Smart Cities
Published 2021-01-01Get full text
Article -
730
An Efficient Random Forest Classifier for Detecting Malicious Docker Images in Docker Hub Repository
Published 2024-01-01Get full text
Article -
731
Detecting command injection attacks in web applications based on novel deep learning methods
Published 2024-10-01Get full text
Article -
732
Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU.
Published 2025-01-01“…The model extracts static features (permissions, API calls, intent filters) and dynamic features (system calls, network activity, inter-process communication) from Android APKs, enabling a comprehensive analysis of application behavior.The proposed model was trained and tested on the Drebin dataset, which includes 129,013 applications (5,560 malware and 123,453 benign).Performance evaluation against NMLA-AMDCEF, MalVulDroid, and LinRegDroid demonstrated that DBN-GRU achieved 98.7% accuracy, 98.5% precision, 98.9% recall, and an AUC of 0.99, outperforming conventional models.In addition, it exhibits faster preprocessing, feature extraction, and malware classification times, making it suitable for real-time deployment.By bridging static and dynamic detection methodologies, the DBN-GRU enhances malware detection capabilities while reducing false positives and computational overhead.These findings confirm the applicability of the proposed model in real-world Android security applications, offering a scalable and high-performance malware detection solution.…”
Get full text
Article -
733
-
734
-
735
scAMZI: attention-based deep autoencoder with zero-inflated layer for clustering scRNA-seq data
Published 2025-04-01Get full text
Article -
736
Intrusion Detection Using Hybrid Pearson Correlation and GS-PSO Optimized Random Forest Technique for RPL-Based IoT
Published 2025-01-01“…The Pearson correlation can effectively extract key data features for different routing attacks. And the hybrid GS-PSO algorithm can optimize the hyperparameters of IDS model and enhance the accuracy of the detection mechanism while significantly reducing computational overhead. …”
Get full text
Article -
737
Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning
Published 2025-07-01“…In this study, we introduced an interdisciplinary framework that aims to enhance network intrusion detection systems (NIDSs). In this framework, we introduced an IDS via feature selection and feature reduction technique(s) with the attention-driven lightweight deep neural networks: Deep Recurrent Neural Networks (RNN), Deep Long Short-Term Memory (LSTM), and Deep Bi-directional Long Short-Term Memory (Bi-LSTM). …”
Get full text
Article -
738
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01“…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
Get full text
Article -
739
Peculiarities of evidence in the course of investigation of criminal offences under parts 1, 2 of Article 111-1 of the Criminal Code of Ukraine
Published 2024-09-01“…It is substantiated that in modern conditions, evidence in the course of investigation of criminal offences under Parts 1, 2 of Art. 111-1 of the Criminal Code of Ukraine is inseparable from taking into account the features of modern equipment which can be used for information transmission, analysis of computer information and information from correspondence, channels and groups in social networks containing valuable information, samples of signatures, seals and other details of documents which reflect information about the collaboration activities of individuals and groups. …”
Get full text
Article -
740
Exploration of machine learning approaches for automated crop disease detection
Published 2024-12-01Get full text
Article