-
621
-
622
-
623
Research on multi-user identity recognition based on Wi-Fi sensing
Published 2024-03-01“…With the advancement of wireless sensing technology, research on Wi-Fi-based identity recognition has garnered significant attention in fields such as human-computer interaction and home security.While identity recognition based on Wi-Fi signals has achieved initial success, it is currently primarily suitable for scenarios involving individual user behavior.Identity recognition for multiple users in concurrent behavior scenarios still faces a series of challenges, including issues related to mutual interference between users and poor model robustness.Therefore, a Wiblack system for recognizing multiple user identities in a concurrent distribution behavior scenario was proposed.The core idea was to train a multi-branch deep neural network (Wiblack-Net) to extract unique features for each individual user.Firstly, the common features among multiple users were extracted using the backbone network.Then, a binary classifier was assigned to each user to determine the presence of the target user within a given group, thereby achieving identity recognition for multiple users based on concurrent behavior.In addition, experiments comparing Wiblack with several independent binary classification models and a single multiclassification model were conducted to analyze operational efficiency.System performance experimental results demonstrate that when simultaneously identifying the identities of three users, Wibalck achieves an average accuracy of 92.97%, an average precision of 93.71%, an average recall of 93.24%, and an average F1 score of 92.43%.…”
Get full text
Article -
624
-
625
Deep Learning-Based Image Watermarking Using Catalan Transform and Non-Negative Matrix Factorization
Published 2025-01-01“…The main contribution of the proposed method is its new combination of the Catalan transform (CT) and non-negative matrix factorization (NMF) with an artificial neural network (ANN) for enhanced watermark embedding and extraction. …”
Get full text
Article -
626
Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols
Published 2025-04-01“…Its one-round exchange model and resistance to both passive and active attacks make it particularly well-suited for constrained devices and dynamic network topologies. The originality of the proposal lies in embedding OWL directly into protocols like CoAP, enabling secure session establishment as a native feature rather than as an auxiliary security layer. …”
Get full text
Article -
627
A Multicomponent Face Verification and Identification System
Published 2025-07-01Get full text
Article -
628
Hybrid CNN-LSTM With Attention Mechanism for Robust Credit Card Fraud Detection
Published 2025-01-01Get full text
Article -
629
-
630
IOT-MDEDTL: IoT Malware Detection based on Ensemble Deep Transfer Learning
Published 2022-09-01Get full text
Article -
631
A Deep Learning-Based Ensemble Framework for Robust Android Malware Detection
Published 2025-01-01Get full text
Article -
632
Lightweight Interpretable Deep Learning Model for Nutrient Analysis in Mobile Health Applications
Published 2025-06-01Get full text
Article -
633
AnomLite: Efficient binary and multiclass video anomaly detection
Published 2025-03-01Get full text
Article -
634
-
635
-
636
DaGAM-Trans: Dual graph attention module-based transformer for offline signature forgery detection
Published 2025-09-01Get full text
Article -
637
Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method
Published 2024-12-01Get full text
Article -
638
A dual-phase deep learning framework for advanced phishing detection using the novel OptSHQCNN approach
Published 2025-07-01Get full text
Article -
639
Deep learning based bio-metric authentication system using a high temporal/frequency resolution transform
Published 2024-12-01Get full text
Article -
640
Smart Real-time Attendance System for Nigerian Universities
Published 2025-01-01Get full text
Article