Suggested Topics within your search.
Suggested Topics within your search.
-
2521
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
2522
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
2523
Analyzing and Classifying Risks Arising During Innovation Project Implementation in Aircraft Motor-Building
Published 2021-04-01Get full text
Article -
2524
Fast Visual Tracking With Robustifying Kernelized Correlation Filters
Published 2018-01-01“…Occlusion and fast motion problems can be effectively solved by the expansion of the search area. …”
Get full text
Article -
2525
Small target detection in UAV view based on improved YOLOv8 algorithm
Published 2025-01-01“…Firstly, a bi-directional feature pyramid network (BiFPN) is introduced to enhance the fusion capability of the features. …”
Get full text
Article -
2526
Review of Multivariate Time Series Clustering Algorithms
Published 2025-03-01“…Initially, based on classification standards such as feature extraction methods, similarity measurement algorithms, and clustering partition frameworks, this paper conducts a comparative analysis of existing multivariate time series clustering algorithms. …”
Get full text
Article -
2527
DScanNet: Packaging Defect Detection Algorithm Based on Selective State Space Models
Published 2025-06-01“…For this reason, an improved target detection model, DScanNet, is proposed in this paper. To address the problem that the model’s detailed feature extraction for small target defects is not sufficient and thus leads to low detection accuracy, the MEFE module, the local feature extraction module (LFEM Block), and the PCR module of the multi-scale convolution and feature enhancement strategy are proposed to enhance the model’s capability of capturing defective features and focusing on specific features, and to improve the detection accuracy. …”
Get full text
Article -
2528
KNEE OSTEOARTHRITIS STAGE CLASSIFICATION BASED ON HYBRID FUSION DEEP LEARNING FRAMEWORK
Published 2025-04-01“…The feature-level, decision-level, score-level, and meta-based fusion technologies were also performed on the outputs of the best three trained models to minimize the individual models’ errors. …”
Get full text
Article -
2529
WCANet: An Efficient and Lightweight Weight Coordinated Adaptive Detection Network for UAV Inspection of Transmission Line Accessories
Published 2025-04-01“…The network is designed with a plug-and-play WCA module that can effectively identify dense small targets, retain information in each channel, and reduce computational overheads, while incorporating Sim-AFPN with a skip-connection structure into the network aggregate feature information layer by layer, enhancing the ability to capture key features, and achieving a lightweight network structure. …”
Get full text
Article -
2530
Enhanced Plant Leaf Classification over a Large Number of Classes Using Machine Learning
Published 2024-11-01“…Features are extracted based on the margin, texture, and shape of the leaves. …”
Get full text
Article -
2531
Valences identitaires de la charge variétale dans la traduction
Published 2021-05-01Get full text
Article -
2532
DAPSS: A Novel Network for DOM Assisted Oblique Photography Point Cloud Semantic Segmentation
Published 2025-01-01“…DAPSS not only effectively addresses the recognition of small-scale surface features, but also resolves the occlusion problems associated with projection-based methods.…”
Get full text
Article -
2533
-
2534
Is There Really Root-and-Pattern Morphology? Evidence from Classical Arabic
Published 2025-02-01Get full text
Article -
2535
A Multiangle MIMO-SAR Fusion Imaging Method Based on Improved Range Migration Algorithm and Improved Geographic Information Scale Invariant Feature Transform Algorithm
Published 2025-01-01“…Finally, an improved method of geographic information-scale invariant feature transform is used to achieve the efficiency fusion of multi-angle imaging results. …”
Get full text
Article -
2536
A Feature Extraction Method of Ship Underwater Noise Using Enhanced Peak Cross-Correlation Empirical Mode Decomposition Method and Multi-Scale Permutation Entropy
Published 2024-12-01“…A feature extraction method based on the combination of improved empirical modal decomposition (IEMD) and multi-scale permutation entropy (MPE) is proposed to address the problem of inaccurate recognition and classification of ship noise signals under complex environmental conditions. …”
Get full text
Article -
2537
Linear Time Train Contraction Minor Labeling for Railway Line Capacity Analysis
Published 2024-09-01“…Abstract When no more than one train is feasibly contained in the separation headway times of two other trains, a triangular gap problem-based method is used to compute the consumed capacity in linear time. …”
Get full text
Article -
2538
-
2539
3D geometric moment invariants from the point of view of the classical invariant theory
Published 2023-01-01Get full text
Article -
2540
Education in Post-Conflict Societies: Angola and Mozambique’s Path to an Accessible and Sovereign Education System
Published 2025-07-01“…Colonial education was modeled on the metropolis, and its characteristic feature was the almost complete exclusion of the indigenous population from the system of education. …”
Get full text
Article