Suggested Topics within your search.
Suggested Topics within your search.
-
3061
AOAFS: A Malware Detection System Using an Improved Arithmetic Optimization Algorithm
Published 2025-04-01“…This issue diminishes the efficacy of Machine Learning models used for malware detection. Feature Selection (FS) is an approach commonly used to reduce the number of features in a malware detection dataset to a smaller set of features to facilitate the ease of the Machine Learning process. …”
Get full text
Article -
3062
VAE-WACGAN: An Improved Data Augmentation Method Based on VAEGAN for Intrusion Detection
Published 2024-09-01“…To address the class imbalance issue in network intrusion detection, which degrades performance of intrusion detection models, this paper proposes a novel generative model called VAE-WACGAN to generate minority class samples and balance the dataset. …”
Get full text
Article -
3063
Tomato ripeness detection method based on FasterNet block and attention mechanism
Published 2025-06-01“…In addition, the SimAM attention mechanism is introduced, enabling the model to intelligently focus on key features of the tomatoes, thereby improving its ability to recognize tomatoes at different maturity stages and enhancing detection accuracy. Furthermore, the generalized intersection over union loss function is employed to introduce a target box overlap metric, optimizing the object localization process and improving the precision of fruit positioning. …”
Get full text
Article -
3064
A Survey on Android Malware Detection Techniques Using Supervised Machine Learning
Published 2024-01-01“…Machine learning (ML) plays a significant role in malware analysis and detection because it can process huge amounts of data, identify complex patterns, and adjust to changing threats. …”
Get full text
Article -
3065
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Published 2024-08-01“…This technique aims to enhance the robustness and performance of these models by subjecting them to adversarial scenarios during the training process. In this paper, we survey detection methods and propose a method to detect adversarial examples using YOLOv7, a commonly used intensive research model. …”
Get full text
Article -
3066
Raspberry Pi-Based IoT System for Grouting Void Detection in Tunnel Construction
Published 2024-10-01“…This paper presents an IoT-based solution for detecting grouting voids in tunnel construction using the Raspberry Pi microcomputer. …”
Get full text
Article -
3067
Tuberculosis detection with customized CNN and oversampling techniques: a deep learning approach
Published 2025-06-01Get full text
Article -
3068
Method of Credit Fraud Detection by Combining Sub-graph Selection and Neighborhood Filtering
Published 2025-02-01“…Credit fraud detection is a hot and difficult research topic in the field of financial fraud detection, especially fraud detection in the scenario of large-scale financial credit transactions. …”
Get full text
Article -
3069
Towards a minimum universal features set for IoT DDoS attack detection
Published 2025-04-01Get full text
Article -
3070
Analysis of TDR Reflection Waveform for Detecting New Energy Power Cable Joint
Published 2022-06-01Get full text
Article -
3071
An Improved Low-Cost Continuous Compaction Detection Method for the Construction of Asphalt Pavement
Published 2019-01-01“…For the monitoring of rolling process, an embedded-based detection system was designed. …”
Get full text
Article -
3072
Tracing truth: dynamic temporal networks for multi-modal fake news detection
Published 2025-07-01“…In response, This study proposes a multimodal approach to fake news detection—the dynamic temporal network (DTN) model. …”
Get full text
Article -
3073
Retracted: Internet of Things Health Detection System in Steel Structure Construction Management
Published 2020-01-01Get full text
Article -
3074
POCT Detection of Pseudomonas aeruginosa by PGM and Application of Preventing Nosocomial Infection of Bronchoscopy
Published 2024-01-01“…The magnetic nanoparticles (MNPs) were synthesized in a single step, followed by the optimization of the coating process with antibodies and invertase to produce the bifunctionalized IMIc. …”
Get full text
Article -
3075
Reinforced Cost-Sensitive Graph Network for Detecting Fraud Leaders in Telecom Fraud
Published 2024-01-01“…Additionally, the significantly smaller number of fraudulent users than benign users further complicates the detection process. To address these challenges, this paper proposes a Reinforced Cost-sensitive Graph Network (RCGN) for detecting fraud leaders in telecom fraud. …”
Get full text
Article -
3076
Research on the Seed Respiration CO2 Detection System Based on TDLAS Technology
Published 2023-01-01“…The respiration intensity curves and respiration rate change details show that the seed respiration CO2 detection system is more suitable for a small amount of seeds than nondispersive infrared (NDIR) CO2 sensor and gas chromatography in real-time monitoring of the breathing process.…”
Get full text
Article -
3077
Global confidence degree based graph neural network for financial fraud detection
Published 2025-04-01“…Graph Neural Networks (GNNs) are widely used in financial fraud detection due to their excellent ability on handling graph-structured financial data and modeling multilayer connections by aggregating information of neighbors. …”
Get full text
Article -
3078
Distributed partition detection and recovery using UAV in wireless sensor and actor networks
Published 2021-08-01“…The requirements for the recovery process i.e., physical movement and communication are fulfilled by UAV. …”
Get full text
Article -
3079
Research on detection methods of related substances and degradation products of the antitumor drug selpercatinib
Published 2025-01-01“…BackgroundSelpercatinib, a selective RET kinase inhibitor, is approved for treating various cancers with RET gene mutations such as RET-rearranged thyroid cancer and non-small cell lung cancer. The presence of process-related and degradation impurities in its active pharmaceutical ingredient (API) can significantly affect its safety and effectiveness. …”
Get full text
Article -
3080
Classification Model for Bot-IoT Attack Detection Using Correlation and Analysis of Variance
Published 2025-04-01“…This research focuses on detecting Bot-IoT activity using the Bot-IoT UNSW Canberra 2018 dataset. …”
Get full text
Article