Suggested Topics within your search.
Suggested Topics within your search.
-
41
Lightweight construction safety behavior detection model based on improved YOLOv8
Published 2025-04-01Subjects: “…Lightweight construction safety behavior detection…”
Get full text
Article -
42
Research Progress on Video-based Abnormal Behavior Detection in the Grain Storage Industry
Published 2025-05-01Subjects: Get full text
Article -
43
Patrolling and Cleaning: Threat Detection and Response Behaviors of Soldiers in a Social Aphid
Published 2025-07-01“…<i>C. lanigera</i> soldiers continuously patrol around the colony to detect potential threats. When encountering potential threats or obstacles, soldiers actively initiate cleaning behavior. …”
Get full text
Article -
44
Individual behavior tracking of heifers by using object detection algorithm YOLOv4
Published 2025-01-01Subjects: “…animal behavior…”
Get full text
Article -
45
Detection and recognition of unsafe behaviors of underground coal miners based on deep learning
Published 2025-03-01“…A top-down approach was adopted to construct a YOLOv5s_swin target detection model based on a self-attention mechanism. …”
Get full text
Article -
46
Real-time classroom student behavior detection based on improved YOLOv8s
Published 2025-04-01“…With the rapid advancement of behavior detection technology, identifying classroom behaviors of students is becoming increasingly common in educational settings. …”
Get full text
Article -
47
A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals
Published 2012-01-01“…In this paper, we propose a behavior-based virus detection method for smart mobile terminals which signals the existence of malicious code through identifying the anomaly of user behaviors. …”
Get full text
Article -
48
APT Detection via Hypergraph Attention Network with Community-Based Behavioral Mining
Published 2025-05-01“…To address this, we propose a Hypergraph Attention Network framework for APT detection. First, we employ anomaly node detection on provenance graphs constructed from kernel logs to select seed nodes, which serve as starting points for discovering overlapping behavioral communities via node aggregation. …”
Get full text
Article -
49
Abnormal Electricity Consumption Behaviors Detection Based on Improved Deep Auto-Encoder
Published 2020-06-01“…In order to accurately detect the abnormal electricity consumption behaviors for reducing the operating costs of power companies, a detection method of abnormal electricity consumption behaviors is proposed based on the improved deep auto-encoder (DAE). …”
Get full text
Article -
50
Sarcasm detection method based on fusion of text semantics and social behavior information
Published 2023-08-01“…Sarcasm is a complex implicit emotion that poses a significant challenge in sentiment analysis, particularly in social network sentiment analysis.Effective sarcasm detection holds immense practical significance in the analysis of network public opinion.The contradictory nature of sarcastic texts, which exhibit implicit semantics opposite to the real emotions of users, often leads to misclassification by traditional sentiment analysis methods.Moreover, sarcasm in daily communication is often conveyed through non-textual cues such as intonation and demeanor.Consequently, sarcasm detection methods solely relying on text semantics fail to incorporate non-textual information, thereby limiting their effectiveness.To leverage the power of text semantics and social behavior information, a sarcasm text detection method based on heterogeneous graph information fusion was proposed.The approach involved the construction of a heterogeneous information network encompassing users, texts, and emotional words.A graph neural network model was then designed to handle the representations of the heterogeneous graph.The model employed a dual-channel attention mechanism to extract social behavior information, captured the deep semantics of text through emotional subgraphs, and ultimately combined text semantics and social behavior information.Extensive experiments conducted on the Twitter dataset demonstrate the superiority of the proposed method over existing approaches for sarcasm text detection and classification.…”
Get full text
Article -
51
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01Subjects: “…Trojan malware;behavior detection;regularization;security…”
Get full text
Article -
52
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01Subjects: Get full text
Article -
53
FOA-BDNet: A behavior detection algorithm for elevator maintenance personnel based on first-order deep network architecture
Published 2024-11-01Subjects: “…behavior detection…”
Get full text
Article -
54
Detecting Credit-Seeking Behavior with Programmed Instruction Framesets in a Formal Languages Course
Published 2025-03-01“…In this work, we attempt to detect the degree to which either behavior takes place and investigate relationships with student performance. …”
Get full text
Article -
55
Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information
Published 2025-01-01“…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. …”
Get full text
Article -
56
SmartMal: A Service-Oriented Behavioral Malware Detection Framework for Mobile Devices
Published 2014-01-01“…This paper presents SmartMal—a novel service-oriented behavioral malware detection framework for vehicular and mobile devices. …”
Get full text
Article -
57
-
58
Research on insider threat detection based on personalized federated learning and behavior log analysis
Published 2025-06-01Subjects: “…Insider threat detection…”
Get full text
Article -
59
Research on mine worker behavior detection in low-light underground coal mine environments
Published 2025-01-01Subjects: “…underground mine worker behavior detection…”
Get full text
Article -
60
A game theory-assisted machine learning methodology for subscriber churn behaviors detection
Published 2020-06-01Get full text
Article