Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
Application of chemotactic behavior for life detection
Published 2025-02-01“…Overall, the results indicated that each of the three organisms showed chemotactic behavior toward L-serine, which, to our knowledge, is the first time that an L-serine-induced chemotactic response has been detected for H. volcanii.…”
Get full text
Article -
3
Multi-Granularity User Anomalous Behavior Detection
Published 2024-12-01“…We introduce the Multi-Granularity User Anomalous Behavior Detection (MG-UABD) system, which combines coarse-grained and fine-grained anomaly detection to improve the accuracy and effectiveness of detecting anomalous behaviors. …”
Get full text
Article -
4
YOLO-CBD: Classroom Behavior Detection Method Based on Behavior Feature Extraction and Aggregation
Published 2025-05-01Subjects: “…classroom behavior detection…”
Get full text
Article -
5
Study on user behavior profiling in insider threat detection
Published 2018-12-01“…Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. …”
Get full text
Article -
6
Virtual Nurse for Detecting Suicide Risk Behaviors in Adolescents
Published 2024-10-01Subjects: Get full text
Article -
7
Indoor Abnormal Behavior Detection for the Elderly: A Review
Published 2025-05-01“…In order to address this challenge, the technology of indoor abnormal behavior detection has become a research hotspot. This paper systematically reviews detection methods based on sensors, video, infrared, WIFI, radar, depth, and multimodal fusion. …”
Get full text
Article -
8
Approach to detecting SQL injection behaviors in network environment
Published 2016-02-01“…Based on the request length, request frequency and feature string, a new method, LFF (length-frequency-feature), was proposed to detect SQL injection behaviors from network traffic. …”
Get full text
Article -
9
Detecting anomalous SRF cavity behavior with unsupervised learning
Published 2025-03-01“…We present an unsupervised learning framework for detecting anomalous superconducting radio-frequency (SRF) cavity behavior at the Continuous Electron Beam Accelerator Facility (CEBAF), emphasizing its initial performance and effectiveness. …”
Get full text
Article -
10
Endogenous detection framework of malicious behavior in information network
Published 2020-10-01Subjects: Get full text
Article -
11
Automated detection of complex zebrafish seizure behavior at scale
Published 2025-06-01“…Abstract Convulsive seizure behaviors are a hallmark feature of epilepsy, but automated detection of these events in freely moving animals is difficult. …”
Get full text
Article -
12
Advanced stimulation and dog behavior analysis system
Published 2025-01-01“…This paper describes a system for analyzing the behavior of a hunting dog using the detection of the dog’s barking and its speed of movement, as well as a system for sound and vibration stimulation of the dog and LED module. …”
Get full text
Article -
13
Identification of Programs Based on the Behavior
Published 2014-12-01Subjects: “…behavior analysis, anomaly detection, pattern mining…”
Get full text
Article -
14
Does ChatGPT show gender bias in behavior detection?
Published 2024-12-01“…However, whether and how ChatGPT contains bias in behavior detection and thus generates ethical concerns in decision-making deserves explored. …”
Get full text
Article -
15
Unknown attack detection model based on network behavior analysis
Published 2016-06-01Subjects: “…intranet behavior…”
Get full text
Article -
16
Midbrain encodes sound detection behavior without auditory cortex
Published 2024-12-01“…By imaging cellular activity in the corticorecipient shell of the inferior colliculus of mice engaged in a sound detection task, we show that the majority of neurons encode information beyond the physical attributes of the stimulus and that the animals’ behavior can be decoded from the activity of those neurons with a high degree of accuracy. …”
Get full text
Article -
17
Research on malicious behavior detection based on iOS system
Published 2017-02-01“…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
Get full text
Article -
18
PUE Attack Detection in CWSN Using Collaboration and Learning Behavior
Published 2013-06-01“…This paper discusses a new approach, based on anomaly behavior detection and collaboration, to detect the PUE attack in CWSN scenarios. …”
Get full text
Article -
19
Detecting phase transitions in collective behavior using manifold's curvature
Published 2017-03-01“…If a given behavior of a multi-agent system restricts the phase variable to an invariant manifold, then we define a phase transition as a change of physical characteristics such as speed, coordination, and structure. …”
Get full text
Article -
20
Crowd abnormal behavior detection based on motion similar entropy
Published 2017-05-01“…It is an important research content of graphic processing in the field of intelligent video surveillance to detect abnormal events.An algorithm based on entropy of motion similarity (EMS) to detect abnormal behavior was proposed.Based on the optical flow algorithm,taking the bottom flow block as the basic unit to get the scene motion information,according to the concept of social network model,the construction scene of the motion network model (MNM) was proposed,the division of the scene particles motion similarity was completed,and the distribution EMS of MNM was calculated in the time domain.Finally,the obtained image entropy was compared with the reasonable threshold,to determine whether abnormal behavior occured.Experimental results indicate that the proposed algo-rithm can detect abnormal behavior effectively and show promising performance while comparing with the state of the art methods.…”
Get full text
Article