-
1001
Mining behavior pattern of mobile malware with convolutional neural network
Published 2020-12-01“…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
Get full text
Article -
1002
DART-Vetter: A Deep Learning Tool for Automatic Triage of Exoplanet Candidates
Published 2025-01-01Get full text
Article -
1003
Tunnel Crack Segmentation Algorithm Based on Feature Enhancement
Published 2025-01-01“…To address these challenges, this paper proposes a tunnel crack detection method. Firstly, a novel Dynamic Feature Enhancement Network (DFEN) module is designed to extract preliminary features using a feature extractor and selectively enhance feature representations through a gating mechanism. …”
Get full text
Article -
1004
Advancing mango quality assurance: Non‐destructive detection of spongy tissue using visible near‐infrared spectroscopy and machine learning classification
Published 2024-06-01“…Through preprocessing and principal component analysis of spectral reflectance data for feature extraction and wavelength optimization, successful wavelength ranges of 650–970 nm were identified, effectively distinguishing between healthy and damaged mangoes. …”
Get full text
Article -
1005
-
1006
Motion velocity as a preattentive feature in cartographic symbolization
Published 2023-09-01“…The same applied to symbols’ shape. Eye movement analysis revealed that successful detection was closely related to the fixation on the target after initial preattentive vision. …”
Get full text
Article -
1007
-
1008
Interpretable multitask deep learning model for detecting and analyzing severity of rice bacterial leaf blight
Published 2025-07-01“…The Convolutional Block Attention Module (CBAM) is independently applied to both the RGB image and its corresponding segmentation mask to emphasize important visual and spatial features. Enhanced features are fused and fed into a lightweight MobileNetV2 classifier for disease severity prediction. …”
Get full text
Article -
1009
Elevation Data Statistical Analysis and Maximum Likelihood Estimation-Based Vehicle Type Classification for 4D Millimeter-Wave Radar
Published 2025-04-01“…The elevation data collected by 4D radar from a real road scenario are applied for further analysis. By establishing radar coordinate systems and geodetic coordinate systems, the distribution feature of vehicles’ elevation is analyzed by spatial geometric transformation referring to the radar installation parameters, and a Gaussian-based probability distribution model is subsequently proposed. …”
Get full text
Article -
1010
-
1011
-
1012
-
1013
Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning
Published 2025-07-01“…We employed Sparse Principal Component Analysis (SPCA) to extract higher-order features. We conducted experiments on the three datasets: the Secure Water Treatment System (SWaT), the Water Distribution (WADI), and the Gas Heating Loop (GHL). …”
Get full text
Article -
1014
Plot-scale peanut yield estimation using a phenotyping robot and transformer-based image analysis
Published 2025-12-01Get full text
Article -
1015
LLM-MalDetect: A Large Language Model-Based Method for Android Malware Detection
Published 2025-01-01“…To address this gap, we introduce LLM-MalDetect, a novel framework that improves LLM-based APK analysis by explicitly modeling semantic dependencies and leveraging structured prompt engineering for optimized detection. …”
Get full text
Article -
1016
-
1017
A Comparative Study of Two-Stage Intrusion Detection Using Modern Machine Learning Approaches on the CSE-CIC-IDS2018 Dataset
Published 2025-03-01“…This study proposes a novel two-stage intrusion detection framework using the CSE-CIC-IDS2018 dataset, a comprehensive and realistic benchmark for network traffic analysis. …”
Get full text
Article -
1018
Enhanced Occupational Safety in Agricultural Machinery Factories: Artificial Intelligence-Driven Helmet Detection Using Transfer Learning and Majority Voting
Published 2024-12-01“…Subsequently, the extracted features were subjected to iterative neighborhood component analysis (INCA) for feature selection, after which they were classified using the k-nearest neighbor (kNN) algorithm. …”
Get full text
Article -
1019
-
1020
Features of occult hepatitis B diagnostics in cancer patients
Published 2025-03-01Get full text
Article