-
401
BERT-based network for intrusion detection system
Published 2025-03-01“…Abstract The rising complexity of cyberattacks poses significant challenges to traditional intrusion detection system (IDS). …”
Get full text
Article -
402
Anatomy of Deep Learning Image Classification and Object Detection on Commercial Edge Devices: A Case Study on Face Mask Detection
Published 2022-01-01“…Developing efficient on-the-edge Deep Learning (DL) applications is a challenging and non-trivial task, as first different DL models need to be explored with different trade-offs between accuracy and complexity, second, various optimization options, frameworks and libraries are available that need to be explored, third, a wide range of edge devices are available with different computation and memory constraints. …”
Get full text
Article -
403
Hierarchical Information-guided robotic grasp detection
Published 2025-05-01“…Abstract With the advancement of deep learning, robotic grasping has seen widespread application in fields, becoming a critical component in enhancing automation. Accurate and efficient grasping capabilities not only significantly boost productivity but also ensure safety and reliability in complex and dynamic environments. …”
Get full text
Article -
404
Research on YOLOv5 Oracle Recognition Algorithm Based on Multi-Module Fusion
Published 2025-01-01“…Detect_Efficient further improves the model’s detection and recognition capabilities. …”
Get full text
Article -
405
Optimized Faster R-CNN with Swintransformer for Robust Multi-Class Wildfire Detection
Published 2025-04-01“…Wildfires are a critical global threat, emphasizing the need for efficient detection systems capable of identifying fires and distinguishing fire-related from non-fire events in their early stages. …”
Get full text
Article -
406
Detecting Signatures of Criticality Using Divergence Rate
Published 2025-04-01“…In biology especially, these signatures of criticality are thought to be connected with efficient computation and information processing. Guided by the classical theory of rate–distortion (RD) from information theory, we propose a measure for detecting and characterizing such phenomena from data. …”
Get full text
Article -
407
Intrusion detection method for IoT in heterogeneous environment
Published 2024-04-01“…In order to address the issue of inadequate training efficiency and subpar model performance encountered by Internet of things (IoT) devices when dealing with resource constraints and non-independent and identically distributed (Non-IID) data, a novel personalized pruning federated learning frame work for IoT intrusion detection was put forth. …”
Get full text
Article -
408
Enhanced Multi-Class Detection of Fake News
Published 2024-05-01“…The result indicates notable limitations in ChatGPT's automated classification, which highlights the complexities of AI-based categorization. Our findings demonstrate the CNN model's efficiency and effectiveness, and show the intricacies of fake news detection. …”
Get full text
Article -
409
Steel Defect Detection Based on YOLO-SAFD
Published 2025-01-01“…Experimental results on the NEU-DET dataset demonstrate that YOLO-SAFD achieves a detection precision of 0.83, a recall of 0.75, and an mAP50:95 of 0.43, outperforming the baseline YOLOv5 and highlighting its superior detection accuracy and efficiency for real-time industrial applications.…”
Get full text
Article -
410
Lightweight framework for misbehavior detection in internet of vehicles
Published 2025-03-01“…Despite LTC and CFC having significantly fewer parameters, making them less complex and more space-efficient than CNN-LSTM, the latter proves to be more time-efficient. …”
Get full text
Article -
411
Examining the Efficiency of Learning-Based Algorithms in the Process of Declaring Customs
Published 2022-12-01“…In the face of the diversity, dynamism, and complexity of the methods used in creating this declaration, human-induced declaration files are produced erroneously. …”
Get full text
Article -
412
Real-Time Stringing Detection for Additive Manufacturing
Published 2025-02-01“…To address data scarcity in training machine learning models, we also release a new dataset and improve upon the results achieved by the Obico server model, one of the most prominent tools for stringing detection. Our contributions aim to enhance process reliability, reduce material wastage, and optimize time efficiency in AM workflows.…”
Get full text
Article -
413
Audio Deepfake Detection Using Deep Learning
Published 2025-03-01“…ABSTRACT This study introduces an enhanced Siamese convolutional neural network (Siamese CNN) architecture with a novel StacLoss function and self‐attention modules for efficient identification of audio deepfakes. Our module directly compares unprocessed original audio with modified audio by initially applying convolutional operations and dual branches to extract complex characteristics from raw audio signals. …”
Get full text
Article -
414
Pupil Detection Algorithm Based on ViM
Published 2025-06-01“…This algorithm introduces weighted feature fusion, aiming to enable the model to adaptively learn the contribution of different feature patches to the pupil detection results; combines ViM with the MSA (multi-head self-attention) mechanism), aiming to integrate global features and improve the accuracy and robustness of pupil detection; and uses FFT (Fast Fourier Transform) to convert the time-domain vector outer product in MSA into a frequency–domain dot product, in order to reduce the computational complexity of the model and improve the detection efficiency of the model. …”
Get full text
Article -
415
A lightweight mechanism for vision-transformer-based object detection
Published 2025-05-01“…It struggles to extract fine-grained details of small and medium-sized objects from low-resolution features, and its computational complexity increases significantly with the input scale, thereby constraining real-time detection efficiency. …”
Get full text
Article -
416
Lightweight blasthole image detection and positioning method
Published 2025-03-01“…The intelligent advancement of explosive-charging robotic arms is critical to achieving safe and efficient explosive filling in tunnel blasting operations, with the blasthole image detection algorithm serving as the core component of the intelligent control system for these robotic arms. …”
Get full text
Article -
417
Estimating Performance Efficiency of Mining and Extracting Sectors Using DEA Models: The Case of Jordan
Published 2022-01-01Get full text
Article -
418
Deep Learning Based DDoS Attack Detection
Published 2025-01-01“…Traditional approaches to detection, based on statistical thresholds and signature-based mechanisms, respectively, can hardly cope with the increasing complexity of such an attack. …”
Get full text
Article -
419
Exploring feature sparsity for out-of-distribution detection
Published 2024-11-01“…Our framework has two types of workflows depending on if external OOD data is available, the complexity of the original training loss is sharply reduced by adopting this modification, meanwhile, the adapted ability and detection performance are enhanced. …”
Get full text
Article -
420
Survey on Image-Based Vehicle Detection Methods
Published 2025-05-01“…However, achieving robust detection remains challenging due to scene complexity, occlusion, scale variation, and varying lighting conditions. …”
Get full text
Article