-
721
-
722
Lightweight UAV Detection Method Based on IASL-YOLO
Published 2025-04-01“…First, we design the CFE-AFPN network to streamline the architecture while boosting feature fusion capabilities across non-adjacent layers. …”
Get full text
Article -
723
An Interpretable Method for Anomaly Detection in Multivariate Time Series Predictions
Published 2025-07-01Get full text
Article -
724
Detecting unknown vulnerabilities in smart contracts using opcode sequences
Published 2024-12-01Get full text
Article -
725
DeepGuard: real-time threat recognition using Golden Jackal optimization with deep learning model
Published 2025-04-01Get full text
Article -
726
A Survey on Android Malware Detection Techniques Using Supervised Machine Learning
Published 2024-01-01Get full text
Article -
727
-
728
High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning
Published 2025-04-01Get full text
Article -
729
-
730
Enhanced CLIP-GPT Framework for Cross-Lingual Remote Sensing Image Captioning
Published 2025-01-01Get full text
Article -
731
MHOE-DETR: A Ship Detection Method for Small and Fuzzy Targets Based on Satellite Remote Sensing Image Data
Published 2025-01-01Get full text
Article -
732
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
Published 2025-01-01“…Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. …”
Get full text
Article -
733
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
Published 2025-01-01Get full text
Article -
734
An ECoG-Based Binary Classification of BCI Using Optimized Extreme Learning Machine
Published 2020-01-01Get full text
Article -
735
-
736
GenConViT: Deepfake Video Detection Using Generative Convolutional Vision Transformer
Published 2025-06-01Get full text
Article -
737
-
738
A Novel Framework for Financial Cybersecurity and Fraud Detection Using XAI-RNN-SGRU
Published 2025-01-01“…Cyber threats involve unauthorized access, alteration, or deletion of private information, extortion, and disruption of business operations. Traditional network security methods need more scalability, data protection, and difficulty detecting advanced threats. …”
Get full text
Article -
739
UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted
Published 2025-01-01“…Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. …”
Get full text
Article -
740
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01“…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
Get full text
Article