Showing 441 - 460 results of 2,002 for search 'algorithm detection problem', query time: 0.13s Refine Results
  1. 441

    Detecting Malware Based on DNS Graph Mining by Futai Zou, Siyu Zhang, Weixiong Rao, Ping Yi

    Published 2015-10-01
    “…After the graph construction, we next transform the problem of malware detection to the graph mining task of inferring graph nodes' reputation scores using the belief propagation algorithm. …”
    Get full text
    Article
  2. 442

    Robustness evaluation of commercial liveness detection platform by Pengcheng WANG, Haibin ZHENG, Jianfei ZOU, Ling PANG, Hu LI, Jinyin CHEN

    Published 2022-02-01
    “…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
    Get full text
    Article
  3. 443
  4. 444

    A Review of Knowledge Distillation in Object Detection by Shengjie Cheng, Qiuxia Zhao, Xinyun Zhang, Nurbiya Yadikar, Kurban Ubul

    Published 2025-01-01
    “…Although target detection has been developed to a high level and can be deployed for applications in several fields, there are still some problems in practice, such as the two-phase detection algorithm has high detection accuracy but slow detection speed, while the one-phase detection algorithm is fast, but its accuracy is poor. …”
    Get full text
    Article
  5. 445
  6. 446

    Outlier detection method based on K-means by Liu Daojun, Liu Shuai, Zhang Yusong, Ou Sicheng

    Published 2025-05-01
    “…In industry, electric power, transportation and other fields, anomalies are often the precursors of problems or failures in the system. Through anomaly identification techniques, system abnormal behavior can be detected in time to prevent or quickly respond to potential failures and improve system reliability and stability. …”
    Get full text
    Article
  7. 447

    Algorithm for Mining Maximal Balanced Bicliques Using Formal Concept Analysis by Ilkhomjon Sadriddinov, Sony Peng, Sophort Siet, Dae-Young Kim, Doo-Soon Park, Gangman Yi

    Published 2025-01-01
    “…Therefore, the semi-equiconcept mining algorithm was applied to the MBB enumeration problem. …”
    Get full text
    Article
  8. 448

    INTERACTIVE ALGORITHM FOR SELECTION OF LINEAR OBJECTS ON AERIAL PHOTOGRAPHS AND SATELLITE IMAGES by Э. Н. Seredin, B. A. Zalesky

    Published 2016-10-01
    “…An interactive algorithm of detection of linear objects by broken lines, based on the developed approach, is offered. …”
    Get full text
    Article
  9. 449

    Trust-Based Cooperative Spectrum Sensing Algorithm in Power Dedicated Network by Jinping Cao, Wei Li, Yiying Zhang

    Published 2015-03-01
    “…To fulfill the communication needs of smart distribution and utilization system,a novel power dedicated network has been developed.The system faces a problem that it may operate coexisted with a 230 data transceiver system.In order to keep the two systems operating stably and efficiently at the same time,a trust-based cooperative spectrum sensing algorithm was presented.According to the characteristics of user behavior,cognitive radio users were classified into fiduciary users,lapsed users and malicious users.By analyzing the relationship among detection result,credibility of cognitive radio users and communication channel signal-to-noise ratio,the credibility weight of cognitive radio users was given,and a trust-based cooperative spectrum sensing algorithm was proposed.The simulation results show that the algorithm improves detection performance effectively.…”
    Get full text
    Article
  10. 450

    Trust-Based Cooperative Spectrum Sensing Algorithm in Power Dedicated Network by Jinping Cao, Wei Li, Yiying Zhang

    Published 2015-03-01
    “…To fulfill the communication needs of smart distribution and utilization system,a novel power dedicated network has been developed.The system faces a problem that it may operate coexisted with a 230 data transceiver system.In order to keep the two systems operating stably and efficiently at the same time,a trust-based cooperative spectrum sensing algorithm was presented.According to the characteristics of user behavior,cognitive radio users were classified into fiduciary users,lapsed users and malicious users.By analyzing the relationship among detection result,credibility of cognitive radio users and communication channel signal-to-noise ratio,the credibility weight of cognitive radio users was given,and a trust-based cooperative spectrum sensing algorithm was proposed.The simulation results show that the algorithm improves detection performance effectively.…”
    Get full text
    Article
  11. 451

    FMCW radar range estimation algorithm based on fast iterative interpolation by Yongchang DUAN, Xin LI, Yaohui HUANG, Ping HUANG

    Published 2019-09-01
    “…For the multi-target detection,a multi-objective range estimation algorithm was proposed based on iterative interpolation to solve the problem of the range accuracy of frequency modulation continuous wave (FMCW) radar being easy to be interfered by spectrum.Firstly,the number of targets and the rough location of the target were obtained through the fast Fourier transform (FFT) and the constant false alarm (CFAR) detection algorithm.Then spectrum was iteratively interpolate,and the inter-spectral interference was eliminated during each iteration to obtain more accurate distance.Simulation results show that the proposed algorithm has higher estimation accuracy in multi-target environment and low Signal-to-noise ratio(SNR).The proposed algorithm is implemented by DSP,which proved that the algorithm meets the real-time requirements and is easy to be implemented in engineering.…”
    Get full text
    Article
  12. 452

    Multiscale Convolutional Neural Networks for Hand Detection by Shiyang Yan, Yizhang Xia, Jeremy S. Smith, Wenjin Lu, Bailing Zhang

    Published 2017-01-01
    “…Although hand detection has been extensively studied for decades, it is still a challenging task with many problems to be tackled. …”
    Get full text
    Article
  13. 453

    Authorship identification methods in student plagiarism detection by A. I. Paramonov, I. A. Trukhanovich

    Published 2023-11-01
    “…In the modern educational context the problem of plagiarism is urgent and requires the development of effective methods of detection and prevention of this phenomenon. …”
    Get full text
    Article
  14. 454

    Energy-Aware Distributed Clustering Algorithm for Improving Network Performance in WSNs by Joon-Ik Kong, Jin-Woo Kim, Doo-Seop Eom

    Published 2014-03-01
    “…However, most protocols in previous literature have the problem of not considering the characteristics of real applications, for example, forest fire detection, intruder detection, target tracking, and the like. …”
    Get full text
    Article
  15. 455

    Optimization Algorithms for Cable Fault Localization and Assessment in Smart Power Systems by Wenxuan Wang, Yali Shi, Minghui Liu

    Published 2025-01-01
    “…In view of the above problems, this paper proposes an optimization algorithm based on the frequency domain-space domain integral transform to enhance the cable fault location capability and assess the fault type and severity. …”
    Get full text
    Article
  16. 456

    Quantum secure communication algorithm based on cyclic code and information compression by Hongyang MA, Xin ZHANG, Peng’ao XU, Fen LIU, Xingkui FAN

    Published 2020-03-01
    “…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
    Get full text
    Article
  17. 457

    Back pain in young people: algorithm of management in practice of primary physician by N. A. Shostak, N. G. Pravdyuk, A. V. Novikova

    Published 2023-01-01
    “…The article describes the basics of the doctor’s approach to the diagnosis of back pain, describes the main strategies of patients routing. The algorithm proposed here includes detection of dangerous conditions, verification of inflammatory rhythm of BP according to criteria ASAS 2009, revealing of persistent phenotype of the lower back pain, stratifying patients for the risk of chronic lower back pain StarT Back in mechanical rhythm; multidisciplinary approach with inclusion of the rheumatologist in specialists team, and after initial consultation the therapist gives direction to the rheumatologist, if necessary. …”
    Get full text
    Article
  18. 458

    Blind Deconvolution for Ultrasound Sequences Using a Noninverse Greedy Algorithm by Liviu-Teodor Chira, Corneliu Rusu, Clovis Tauber, Jean-Marc Girault

    Published 2013-01-01
    “…The blind deconvolution of ultrasound sequences in medical ultrasound technique is still a major problem despite the efforts made. This paper presents a blind noninverse deconvolution algorithm to eliminate the blurring effect, using the envelope of the acquired radio-frequency sequences and a priori Laplacian distribution for deconvolved signal. …”
    Get full text
    Article
  19. 459

    Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm by Xuyi Chen, Mingxi Ma, Chengkui Liu, Haifeng Xie, Shaoqi Wang

    Published 2025-01-01
    “…Interference resource optimization is a prerequisite for air defense suppression mission planning, and the degree of optimization of interference resources directly determines the quality of the interference results. In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
    Get full text
    Article
  20. 460