Search alternatives:
feature » features (Expand Search)
Showing 1,001 - 1,020 results of 5,605 for search 'Feature detection analysis', query time: 0.20s Refine Results
  1. 1001

    Mining behavior pattern of mobile malware with convolutional neural network by Xin ZHANG, Weizhong QIANG, Yueming WU, Deqing ZOU, Hai JIN

    Published 2020-12-01
    “…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
    Get full text
    Article
  2. 1002
  3. 1003

    Tunnel Crack Segmentation Algorithm Based on Feature Enhancement by Lihua Feng, Aijun Yao, An Huang

    Published 2025-01-01
    “…To address these challenges, this paper proposes a tunnel crack detection method. Firstly, a novel Dynamic Feature Enhancement Network (DFEN) module is designed to extract preliminary features using a feature extractor and selectively enhance feature representations through a gating mechanism. …”
    Get full text
    Article
  4. 1004

    Advancing mango quality assurance: Non‐destructive detection of spongy tissue using visible near‐infrared spectroscopy and machine learning classification by Patil Rajvardhan Kiran, Md Yeasin, Pramod Aradwad, T. V. Arunkumar, Roaf Ahmad Parray

    Published 2024-06-01
    “…Through preprocessing and principal component analysis of spectral reflectance data for feature extraction and wavelength optimization, successful wavelength ranges of 650–970 nm were identified, effectively distinguishing between healthy and damaged mangoes. …”
    Get full text
    Article
  5. 1005
  6. 1006

    Motion velocity as a preattentive feature in cartographic symbolization by Paweł Cybulski, Vassilios Krassanakis

    Published 2023-09-01
    “…The same applied to symbols’ shape. Eye movement analysis revealed that successful detection was closely related to the fixation on the target after initial preattentive vision. …”
    Get full text
    Article
  7. 1007
  8. 1008

    Interpretable multitask deep learning model for detecting and analyzing severity of rice bacterial leaf blight by Sudhesh K. M, Aarthi R., Sainamole Kurian. P, Sikha O.K

    Published 2025-07-01
    “…The Convolutional Block Attention Module (CBAM) is independently applied to both the RGB image and its corresponding segmentation mask to emphasize important visual and spatial features. Enhanced features are fused and fed into a lightweight MobileNetV2 classifier for disease severity prediction. …”
    Get full text
    Article
  9. 1009

    Elevation Data Statistical Analysis and Maximum Likelihood Estimation-Based Vehicle Type Classification for 4D Millimeter-Wave Radar by Mengyuan Jing, Haiqing Liu, Fuyang Guo, Xiaolong Gong

    Published 2025-04-01
    “…The elevation data collected by 4D radar from a real road scenario are applied for further analysis. By establishing radar coordinate systems and geodetic coordinate systems, the distribution feature of vehicles’ elevation is analyzed by spatial geometric transformation referring to the radar installation parameters, and a Gaussian-based probability distribution model is subsequently proposed. …”
    Get full text
    Article
  10. 1010
  11. 1011
  12. 1012
  13. 1013

    Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning by Qawsar Gulzar, Khurram Mustafa

    Published 2025-07-01
    “…We employed Sparse Principal Component Analysis (SPCA) to extract higher-order features. We conducted experiments on the three datasets: the Secure Water Treatment System (SWaT), the Water Distribution (WADI), and the Gas Heating Loop (GHL). …”
    Get full text
    Article
  14. 1014
  15. 1015

    LLM-MalDetect: A Large Language Model-Based Method for Android Malware Detection by Ruirui Feng, Hui Chen, Shuo Wang, Md Monjurul Karim, Qingshan Jiang

    Published 2025-01-01
    “…To address this gap, we introduce LLM-MalDetect, a novel framework that improves LLM-based APK analysis by explicitly modeling semantic dependencies and leveraging structured prompt engineering for optimized detection. …”
    Get full text
    Article
  16. 1016
  17. 1017

    A Comparative Study of Two-Stage Intrusion Detection Using Modern Machine Learning Approaches on the CSE-CIC-IDS2018 Dataset by Isuru Udayangani Hewapathirana

    Published 2025-03-01
    “…This study proposes a novel two-stage intrusion detection framework using the CSE-CIC-IDS2018 dataset, a comprehensive and realistic benchmark for network traffic analysis. …”
    Get full text
    Article
  18. 1018

    Enhanced Occupational Safety in Agricultural Machinery Factories: Artificial Intelligence-Driven Helmet Detection Using Transfer Learning and Majority Voting by Simge Özüağ, Ömer Ertuğrul

    Published 2024-12-01
    “…Subsequently, the extracted features were subjected to iterative neighborhood component analysis (INCA) for feature selection, after which they were classified using the k-nearest neighbor (kNN) algorithm. …”
    Get full text
    Article
  19. 1019
  20. 1020