-
101
Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques
Published 2025-01-01“…These feature selection algorithms are also compared with a manual feature selection approach to determine whether a manual, automated, or hybrid feature selection approach would be more suitable for this type of problem.…”
Get full text
Article -
102
Automatic detection of fake reviews at marketplaces using expert-based features and consumers’ reactions
Published 2024-10-01Get full text
Article -
103
-
104
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
Published 2021-06-01“…Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. …”
Get full text
Article -
105
Improving Image Spam Detection Using a New Image Texture Features Selection
Published 2024-12-01“…The purpose of the research is to use image texture features to detect image spam. So far, 22 features of image texture have not been used in one place to detect image spam. …”
Get full text
Article -
106
Robust tampering detection and localization of composite image
Published 2017-08-01“…Aiming at the problem of tamper detection of composite image of natural images and highly simulated computer-generated images,a method of extracting image block color and texture feature based on differential histogram and local binary texture descriptor in YCbCr color space was proposed.By training posterior probability support vector machine,the image block to be measured was identified.In the case of non-overlapping block,the approximate tampering area was general judged,then the block was discriminated by pixel in the region,ultimately the accurate location of tampering area was achieved.The experimental results show that the recognition rate of 128 dpi×128 dpi image blocks is 94.75%,which is higher than other methods.The tapering region of the synthesized image can be precisely positioned,and the rotation and scaling operation show good coercivity.…”
Get full text
Article -
107
VMC-Net: multi-scale feature aggregation and distribution with contextual attention guided fusion for aerial object detection
Published 2025-06-01“…However, this task faces many challenges such as small object size and complex background, which increase the difficulty of detection. Existing methods usually use multi-scale feature fusion or attention mechanism to improve performance, but they often ignore the role of object feature perception in the image and have problems such as insufficient use of context information. …”
Get full text
Article -
108
Shot boundary detection algorithm based on ORB
Published 2013-11-01“…Experi-ment results show that the proposed algorithm is effective to solve false and miss detection caused by the above problems, with a sharp rise in procession speed.…”
Get full text
Article -
109
Grape cluster detection based on spatial-to-depth convolution and attention mechanism
Published 2024-12-01“…Secondly, based on the problem of information loss in grape cluster detection, a plug-and-play module of spatial-to-depth convolution (STD-Conv) is added to enrich grape cluster feature information. …”
Get full text
Article -
110
A lightweight personnel detection method for underground coal mines
Published 2025-04-01“…To address the above problems, a lightweight personnel detection method YOLOv5-CWG is proposed for underground coal mine based on YOLOv5.Firstly, the coordinate attention mechanism (Coordinate Attention) embedded in the backbone network adaptively adjusts the weights of each channel in the feature map to enhance the expression ability of the features. …”
Get full text
Article -
111
Employing combined spatial and frequency domain image features for machine learning-based malware detection
Published 2024-07-01“…However, the problem lies in devising accurate ML models which capture the ever evolving landscape of malwares by effectively leveraging all the possible features from Android application packages (APKs).This paper delved into this domain by proposing, implementing, and evaluating an image-based Android malware detection (AMD) framework that harnessed the power of feature hybridization. …”
Get full text
Article -
112
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
113
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
114
Research on traffic representation in network anomaly detection
Published 2025-01-01“…Aiming to address the problem of information loss in traffic representation for network anomaly detection, the impact of feature information dimension of different traffic representation on anomaly detection performance was analyzed from the perspective of data collection granularity. …”
Get full text
Article -
115
A novel similarity-constrained feature selection method for epilepsy detection via EEG signals
Published 2025-07-01“…Then, an optimization problem for feature selection is formulated by enhancing intra-class similarity and reducing inter-class similarity. …”
Get full text
Article -
116
Application of Permutation Entropy in Feature Extraction for Near-Infrared Spectroscopy Noninvasive Blood Glucose Detection
Published 2017-01-01“…Finally, the support vector regression and partial least square regression are used to establish the mathematical model between the characteristic spectral data and glucose concentration, and the results are compared with conventional feature extraction methods. Results show that the proposed new method can extract useful information from near-infrared spectra, effectively solve the problem of characteristic wave band extraction, and improve the analytical accuracy of spectral and model stability.…”
Get full text
Article -
117
An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network
Published 2023-01-01“…The problem of intrusion detection has new solutions, thanks to the widespread use of machine learning in the field of network security, but it still has a few issues at this time. …”
Get full text
Article -
118
Anchor-Free Object Detection Algorithm Based on Dual-Angle Multi-Scale Feature Fusion
Published 2024-08-01“… In response to the problem of insufficient feature extraction and insufficient detection accuracy in the anchor-free frame object detection algorithm CenterNet. …”
Get full text
Article -
119
Research on the performance of the SegFormer model with fusion of edge feature extraction for metal corrosion detection
Published 2025-03-01“…In this paper, a SegFormer metal corrosion detection method based on parallel extraction of edge features is proposed. …”
Get full text
Article -
120
Edge-Guided Feature Pyramid Networks: An Edge-Guided Model for Enhanced Small Target Detection
Published 2024-12-01“…The goal is to resolve the problem of missing target information that occurs when Feature Pyramid Networks (FPNs) perform continuous down-sampling to obtain deeper semantic features. …”
Get full text
Article