-
761
Characteristics of Port Scan Traffic: A Case Study Using Nmap
Published 2025-01-01Get full text
Article -
762
-
763
-
764
Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection
Published 2025-01-01“…Mobile phones have evolved into powerful handheld computers, fostering a vast application ecosystem but also increasing security and privacy risks. …”
Get full text
Article -
765
-
766
An Interpretable Siamese Attention Res-CNN for Fingerprint Spoofing Detection
Published 2024-01-01Get full text
Article -
767
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
Published 2025-01-01Get full text
Article -
768
Robust Face Recognition Using Deep Learning and Ensemble Classification
Published 2025-01-01“…Existing methods often struggle to strike a balance between accuracy, computational efficiency, and robustness. Deep learning has become popular for automatically learning features through convolution layers. …”
Get full text
Article -
769
GenConViT: Deepfake Video Detection Using Generative Convolutional Vision Transformer
Published 2025-06-01Get full text
Article -
770
Lightweight UAV Detection Method Based on IASL-YOLO
Published 2025-04-01“…First, we design the CFE-AFPN network to streamline the architecture while boosting feature fusion capabilities across non-adjacent layers. …”
Get full text
Article -
771
Real-Time Corn Variety Recognition Using an Efficient DenXt Architecture with Lightweight Optimizations
Published 2025-01-01“…Representative Batch Normalization (RBN) is introduced into the DenseNet-121 model to improve the generalization ability of the model, and the SE module and deep separable convolution are integrated to enhance the feature representation and reduce the computational complexity, and the Dropout regularization is introduced to further improve the generalization ability of the model and reduce the overfitting. …”
Get full text
Article -
772
UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted
Published 2025-01-01“…Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. …”
Get full text
Article -
773
Enhancing anomaly detection in plant disease recognition with knowledge ensemble
Published 2025-08-01Get full text
Article -
774
-
775
Accurately Estimate and Analyze Human Postures in Classroom Environments
Published 2025-04-01Get full text
Article -
776
Dual-Model Synergy for Fingerprint Spoof Detection Using VGG16 and ResNet50
Published 2025-02-01Get full text
Article -
777
Enhanced CLIP-GPT Framework for Cross-Lingual Remote Sensing Image Captioning
Published 2025-01-01Get full text
Article -
778
Classification Model for Bot-IoT Attack Detection Using Correlation and Analysis of Variance
Published 2025-04-01“…Industry 4.0 requires secure networks as the advancements in IoT and AI exacerbate the challenges and vulnerabilities in data security. …”
Get full text
Article -
779
-
780
Deep Learning-Based Atmospheric Visibility Detection
Published 2024-11-01“…This paper systematically reviews the applications of various deep learning models—Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Generative Adversarial Networks (GANs), and Transformer networks—in visibility estimation, prediction, and enhancement. …”
Get full text
Article