-
301
Stealthy graph backdoor attack based on feature trigger
Published 2025-06-01“…To solve this problem, we propose a novel graph Backdoor Attack based on Feature Trigger (BAFT). …”
Get full text
Article -
302
Analysis of super-long and sparse feature in pseudo-random sequence based on similarity
Published 2016-10-01“…Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.…”
Get full text
Article -
303
Evaluation of Key Remote Sensing Features for Bushfire Analysis
Published 2025-05-01“…This study evaluates remote sensing features to resolve problems associated with feature redundancy, low efficiency, and insufficient input feature analysis in bushfire detection. …”
Get full text
Article -
304
An Effective Feature Extraction Method for Tomato Leafminer - Tuta Absoluta (Meyrick) (Lepidoptera: Gelechiidae) Classification
Published 2025-05-01“…These results highlight the potential of combining deep learning-based feature extraction with conventional machine learning for early pest detection. …”
Get full text
Article -
305
Epidemiological Features of Sexually Transmitted Infections in the Republic of Tatarstan
Published 2020-09-01Get full text
Article -
306
Smart Agricultural Pest Detection Using I-YOLOv10-SC: An Improved Object Detection Framework
Published 2025-01-01“…Aiming at the problems of insufficient detection accuracy and high false detection rates of traditional pest detection models in the face of small targets and incomplete targets, this study proposes an improved target detection network, I-YOLOv10-SC. …”
Get full text
Article -
307
Learning Feature Fusion in Deep Learning-Based Object Detector
Published 2020-01-01“…Object detection in real images is a challenging problem in computer vision. …”
Get full text
Article -
308
Ensemble Classifiers and Feature-Based Methods for Structural Damage Assessment
Published 2020-01-01“…In this paper, a new structural damage detection framework is proposed based on vibration analysis and pattern recognition, which consists of two stages: (1) signal processing and feature extraction and (2) damage detection by combining the classification result. …”
Get full text
Article -
309
Android collusion attack detection model
Published 2018-06-01“…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
Get full text
Article -
310
MP-NER: Morpho-Phonological Integration Embedding for Chinese Named Entity Recognition
Published 2025-01-01“…Additionally, the lack of clear separators between Chinese characters exacerbates these challenges, leading to difficulties in boundary detection and entity category determination. Inspired by the hieroglyphic and phonetic features of Chinese characters, this study proposes a multi-feature fusion embedding model (MP-NER). …”
Get full text
Article -
311
Workflow Detection with Improved Phase Discriminability
Published 2024-05-01“…Workflow detection is a challenge issue in the process of Industry 4.0, which plays a crucial role in intelligent production. …”
Get full text
Article -
312
MFAN: Multi-Feature Attention Network for Breast Cancer Classification
Published 2024-11-01“…Despite various AI-based strategies in the literature, similarity in cancer and non-cancer regions, irrelevant feature extraction, and poorly trained models are persistent problems. …”
Get full text
Article -
313
Explainability Feature Bands Adaptive Selection for Hyperspectral Image Classification
Published 2025-05-01“…Hyperspectral remote sensing images are widely used in resource exploration, urban planning, natural disaster assessment, and feature classification. Aiming at the problems of poor interpretability of feature classification algorithms for hyperspectral images, multiple feature dimensions, and difficulty in effectively improving classification accuracy, this paper proposes a feature band adaptive selection method for hyperspectral images. …”
Get full text
Article -
314
An Interpretability Method for Broken Wire Detection
Published 2025-06-01“…Therefore, it is necessary to perform broken wire detection. Deep learning has powerful feature-learning capabilities and is characterized by high accuracy and efficiency, and the YOLOv8 object detection model has been adopted to detect wire breaks in electromagnetic signal images of wire rope, achieving better results. …”
Get full text
Article -
315
-
316
Medical Image Fusion Based on Feature Extraction and Sparse Representation
Published 2017-01-01“…SM contains the local structure feature captured by the Laplacian of a Gaussian (LOG) and EM contains the energy and energy distribution feature detected by the mean square deviation. …”
Get full text
Article -
317
Automatic picking method for ground penetrating radar wave groups at rough coal-rock interfaces
Published 2025-06-01“…Forward modeling and experimental results show that this method can accurately detect the position of rough coal-rock interfaces. …”
Get full text
Article -
318
Driving Detection Based on the Multifeature Fusion
Published 2022-01-01“…In order to solve the problems of facial feature localization and driver fatigue state identification methods in driving fatigue detection, a driving detection method based on the multifeature fusion was proposed. …”
Get full text
Article -
319
RGB-T Object Detection With Failure Scenarios
Published 2025-01-01“…This article proposes a multimodal object detection method named diffusion enhanced object detection network (DENet), aiming to address modality failure problems caused by nonroutine environments, sensor anomalies, and other factors, while suppressing redundant information in multimodal data to improve model accuracy. …”
Get full text
Article -
320
FEATURES OF THE SCHEMES OF CASH PAYMENTS AND BANKING OPERATIONS WITH MONEY LAUNDERING
Published 2016-08-01Get full text
Article