Search alternatives:
image » images (Expand Search)
Showing 161 - 180 results of 261 for search 'attack image analysis', query time: 0.10s Refine Results
  1. 161

    Coupling Heterogeneous Neural Networks With Memristors by Li Zhang, Rongli Jiang, Yike Ma, Xiangkai Pu, Zhongyi Li

    Published 2025-01-01
    “…The performance analysis of encrypted images demonstrates that the algorithm offers strong robustness during transmission and effective resistance against attacks, ensuring privacy and security.…”
    Get full text
    Article
  2. 162

    Robust Abnormal Event Recognition via Motion and Shape Analysis at ATM Installations by Vikas Tripathi, Durgaprasad Gangodkar, Vivek Latta, Ankush Mittal

    Published 2015-01-01
    “…However, this convenience is marred by criminal activities like money snatching and attack on customers, which are increasingly affecting the security of bank customers. …”
    Get full text
    Article
  3. 163
  4. 164

    An Evaluation of White Matter Intensities in Patients with Pediatric Migraine by Burak Gülcen, Hilal Aydın, Erdoğan Bülbül, Bahar Yanik

    Published 2025-01-01
    “…There was no significant relationship between hyperintensity in migraine patients and attack duration or frequency. Analysis also revealed no significant difference in terms of hyperintensity volumes (mm<sup>3</sup>) between the study group (19.73 ± 24.26) and the control group (5.62 ± 1.83). …”
    Get full text
    Article
  5. 165
  6. 166

    Face-work in North American Presidential Debates: A Corpus-based Multi-theoretical Approach by Rosa María Martínez Abellán

    Published 2024-07-01
    “…This paper presents a corpus-based three-fold analysis blending qualitative, quantitative and statistical methodologies to observe the evolution of facework in this context, focusing on impoliteness and image restoration manifestations. …”
    Get full text
    Article
  7. 167

    A secure and imperceptible communication system for sharing co-ordinate data by Ranjeet Bidwe, Sahil Kale, Gautam Khaire, Jay Patankar, Deepak Mane, Suraj Sawant

    Published 2025-07-01
    “…The mean square error (MSE) was consistently below 0.001, and histogram analysis confirmed visual consistency between cover and stego images. …”
    Get full text
    Article
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172
  13. 173

    An analysis of social media content shared by right-wing extremist groups in the United States, the Great Britain and Australia by Oday Masalha, Özen Baş

    Published 2023-06-01
    “…The extreme right movements have increasingly appeared on social media, especially on Twitter and Facebook, coinciding with the 2019 New Zealand attack, the 2019 El Paso incident, and Britain’s exit from the European Union in 2020. …”
    Get full text
    Article
  14. 174

    Conic curve encryption and digital signature based on complex number theory for cybersecurity applications by Ahmed Kamal, H. A. El-Kamchochi, Adel El-Fahar, Esam A. A. Hagras

    Published 2025-07-01
    “…Security analysis validates robustness against various attacks, with NIST statistical tests confirming ICC-PRNG effectiveness. …”
    Get full text
    Article
  15. 175

    Shared neural signatures of photophobia in migraine and post-traumatic headache: a task-based fMRI study by Rune Häckert Christensen, Haidar Muhsen Al-Khazali, Anna Gudrun Melchior, Messoud Ashina, Håkan Ashina

    Published 2025-07-01
    “…These patterns parallel those observed during migraine attacks, indicating shared neural mechanisms between the two headache disorders.…”
    Get full text
    Article
  16. 176
  17. 177
  18. 178

    Verifying Robustness of Neural Networks in Vision-Based End-to-End Autonomous Driving by Cinzia Bernardeschi, Giuseppe Lami, Francesco Merola, Federico Rossi

    Published 2025-01-01
    “…The main contributions of this work are: i) We provide a comprehensive analysis of current neural-network-based perception and decision-making components in autonomous vehicles, highlighting their susceptibility to attacks or perturbation. ii) We develop and implement a novel framework for systematically evaluating and verifying the robustness of neural networks against such perturbations, focusing on imperceptible image modifications. iii) We present empirical results demonstrating our verification framework&#x2019;s effectiveness in identifying weaknesses and providing probabilistic guarantees on network behavior. …”
    Get full text
    Article
  19. 179

    Multimodal malware classification using proposed ensemble deep neural network framework by Sadia Nazim, Muhammad Mansoor Alam, Safdar Rizvi, Jawahir Che Mustapha, Syed Shujaa Hussain, Mazliham Mohd Su’ud

    Published 2025-05-01
    “…This collaborative approach is the least addressed and pivotal for protecting against the advancing environment of modern malware attacks. This study presents a state-of-the-art malware analysis framework that employs a multimodal approach by integrating malware images and numeric features for effective malware classification. …”
    Get full text
    Article
  20. 180