-
1641
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01“…The experimental results show that the global LDoS attack traffic detection method based on the Hurst index and GBDT algorithm achieves better detection results under different attack rates.…”
Get full text
Article -
1642
A Method of Abnormal Behavior Detection for Safety Site Surveillance
Published 2025-01-01“…For the complex background in the image, a multiframe differential superposition algorithm is proposed to denoise the target image; a feature extraction method is given to extract features for the target image, and then a more complete image with target features is obtained after filtering; a normal behavior model is established to extract the motion information of the target from a single frame of the image; an abnormal detection method is proposed to determine whether it belongs to abnormal behavior. …”
Get full text
Article -
1643
A novel transformer-based approach for cardiovascular disease detection
Published 2025-04-01Get full text
Article -
1644
Combining Unsupervised Anomaly Detection and Neural Networks for Driver Identification
Published 2017-01-01“…If an anomaly is detected, the algorithm proceeds to find relevant features in the input signals and use neural networks to identify drivers. …”
Get full text
Article -
1645
An optimization-inspired intrusion detection model for software-defined networking
Published 2025-01-01“…This paper proposes an enhanced spider wasp optimizer (ESWO) algorithm for feature dimensionality reduction of intrusion detection datasets and constructs a new intrusion detection model (IDM), namely ESWO-IDM, for SDN. …”
Get full text
Article -
1646
The analysis of fraud detection in financial market under machine learning
Published 2025-08-01“…Therefore, this paper proposes a financial fraud detection model based on Stacking ensemble learning algorithm, which integrates many basic learners such as logical regression (LR), decision tree (DT), random forest (RF), Gradient Boosting Tree (GBT), support vector machine (SVM) and neural network (NN), and introduces feature importance weighting and dynamic weight adjustment mechanism to improve the model performance. …”
Get full text
Article -
1647
An AI framework for counterattack detection and decision-making evaluation in football
Published 2025-04-01Get full text
Article -
1648
A Method for Detecting Tomato Maturity Based on Deep Learning
Published 2024-11-01“…The algorithm employs several technical means to improve detection accuracy and efficiency. …”
Get full text
Article -
1649
Sysmon event logs for machine learning-based malware detection
Published 2025-12-01“…In this research, we employed various machine learning algorithms, both classification (supervised learning) and outlier detection (unsupervised learning) approaches, such as Naive Bayes, Decision Tree, Random Forest, Support Vector Machine (SVM) for supervised learning, and Isolation Forest, Local Outlier Factor (LOF), and One-Class SVM for unsupervised learning. …”
Get full text
Article -
1650
Enhancing DDoS Attack Classification through SDN and Machine Learning: A Feature Ranking Analysis
Published 2025-04-01“…We reduced the feature up to 5 effective features without compromising the classification accuracy. …”
Get full text
Article -
1651
Precision Detection of Infrared Small Target in Ground-to-Air Scene
Published 2024-11-01“…In recent years, most target detection methods usually use the statistical features of a rectangular window to represent the contrast between the target and the background. …”
Get full text
Article -
1652
Fault detection method for distribution network based on edge computing
Published 2025-01-01“…Based on the edge side, combined with multi-dimensional S-transform fusion algorithm and phase modulus transformation matrix method, the relevant fault features of distribution network are extracted. …”
Get full text
Article -
1653
Myocarditis Detection Using Proximal Policy Optimization and Mutual Learning
Published 2024-09-01“…The model employs multiple convolutional neural networks (CNNs) to extract feature vectors from images for classification. To address class imbalance, a proximal policy optimization (PPO)-based algorithm is utilized, significantly improving the training process by preventing abrupt policy shifts and stabilizing them. …”
Get full text
Article -
1654
Deep learning-based object detection and robotic arm grasping
Published 2024-08-01“…For the grasping task, a single-stage grasping pose detection algorithm was designed. Firstly, considering the interference present in unstructured environments, RGB-D images were selected as the input data for the grasping network, and GG-CNN was chosen as the backbone network. …”
Get full text
Article -
1655
Broiler Behavior Detection and Tracking Method Based on Lightweight Transformer
Published 2025-03-01“…The FasterNet network based on partial convolution (PConv) was used to replace the Resnet18 backbone network to reduce the computational complexity of the model and to improve the speed of model detection. In addition, we propose a new cross-scale feature fusion network to optimize the neck network of the original model. …”
Get full text
Article -
1656
Detection of DRFM Deception Jamming Based on Diagonal Integral Bispectrum
Published 2025-06-01“…Simulations and experimental results show that the correct detection rate reaches 92% at a jamming-to-signal ratio (JSR) and SNR of 0 dB, validating the effectiveness of the algorithm.…”
Get full text
Article -
1657
Use of satellite data for detecting icebergs and evaluating the iceberg threats
Published 2018-12-01“…Te algorithms of the iceberg detection, the procedure of the false target identifcation, and determination the horizontal dimensions of the icebergs and their location are described. …”
Get full text
Article -
1658
An Effective Detection Approach for Phishing URL Using ResMLP
Published 2024-01-01“…Traditional blacklists struggle to identify dynamic URLs, necessitating advanced detection mechanisms. In this study, we propose an effective approach utilizing residual pipelining for phishing URL detection. …”
Get full text
Article -
1659
Field Obstacle Detection and Location Method Based on Binocular Vision
Published 2024-09-01“…The improved model incorporates the Large Separable Kernel Attention (LSKA) module to enhance the extraction of field obstacle features. Additionally, the use of a Poly Kernel Inception (PKI) Block reduces model size while improving obstacle detection across various scales. …”
Get full text
Article -
1660
Detecting unknown vulnerabilities in smart contracts using opcode sequences
Published 2024-12-01“…Next, we employ an n-gram model and a vector weight penalty mechanism to extract the opcode sequence features. We then use machine learning algorithms to detect unknown vulnerabilities based on the similarity principle. …”
Get full text
Article