Search alternatives:
networks » network (Expand Search)
Showing 761 - 780 results of 836 for search 'Computer networks Security features.', query time: 0.09s Refine Results
  1. 761
  2. 762
  3. 763
  4. 764

    Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection by Fatima Bourebaa, Mohamed Benmohammed

    Published 2025-01-01
    “…Mobile phones have evolved into powerful handheld computers, fostering a vast application ecosystem but also increasing security and privacy risks. …”
    Get full text
    Article
  5. 765
  6. 766
  7. 767
  8. 768

    Robust Face Recognition Using Deep Learning and Ensemble Classification by Pavani Chitrapu, Mahesh Kumar Morampudi, Hemantha Kumar Kalluri

    Published 2025-01-01
    “…Existing methods often struggle to strike a balance between accuracy, computational efficiency, and robustness. Deep learning has become popular for automatically learning features through convolution layers. …”
    Get full text
    Article
  9. 769
  10. 770

    Lightweight UAV Detection Method Based on IASL-YOLO by Huaiyu Yang, Bo Liang, Song Feng, Ji Jiang, Ao Fang, Chunyun Li

    Published 2025-04-01
    “…First, we design the CFE-AFPN network to streamline the architecture while boosting feature fusion capabilities across non-adjacent layers. …”
    Get full text
    Article
  11. 771

    Real-Time Corn Variety Recognition Using an Efficient DenXt Architecture with Lightweight Optimizations by Jin Zhao, Chengzhong Liu, Junying Han, Yuqian Zhou, Yongsheng Li, Linzhe Zhang

    Published 2025-01-01
    “…Representative Batch Normalization (RBN) is introduced into the DenseNet-121 model to improve the generalization ability of the model, and the SE module and deep separable convolution are integrated to enhance the feature representation and reduce the computational complexity, and the Dropout regularization is introduced to further improve the generalization ability of the model and reduce the overfitting. …”
    Get full text
    Article
  12. 772

    UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted by Chunpeng Liu, Tao Huang, Maode Ma

    Published 2025-01-01
    “…Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. …”
    Get full text
    Article
  13. 773
  14. 774
  15. 775
  16. 776
  17. 777
  18. 778

    Classification Model for Bot-IoT Attack Detection Using Correlation and Analysis of Variance by Firgiawan Faira, Dandy Pramana Hostiadi

    Published 2025-04-01
    “…Industry 4.0 requires secure networks as the advancements in IoT and AI exacerbate the challenges and vulnerabilities in data security. …”
    Get full text
    Article
  19. 779
  20. 780

    Deep Learning-Based Atmospheric Visibility Detection by Yawei Qu, Yuxin Fang, Shengxuan Ji, Cheng Yuan, Hao Wu, Shengbo Zhu, Haoran Qin, Fan Que

    Published 2024-11-01
    “…This paper systematically reviews the applications of various deep learning models—Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Generative Adversarial Networks (GANs), and Transformer networks—in visibility estimation, prediction, and enhancement. …”
    Get full text
    Article