-
181
A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping
Published 2025-03-01“…The aim of this paper was to adapt and evolve open-source TLS fingerprinting techniques with increased features to enhance granularity and to produce a similarity-mapping system that would enable the tracking and detection of previously unknown malicious domains. …”
Get full text
Article -
182
Text similarity detection method based on NLP
Published 2021-10-01“…Current text similarity detection methods that ignore document structure information and lack semantic relevance.To solve these problems, a text-oriented similarity detection method was proposed.First, analytic hierarchy process (AHP) was used to calculate word position weight to extract feature words.Second, the Pearson correlation coefficient was used to measure semantic correlation between words which was the weight of generalized Dice coefficient to calculate similarity.Experimental results show that the proposed method can improve the precision of feature word extraction and the accuracy of similarity calculation results.…”
Get full text
Article -
183
Text similarity detection method based on NLP
Published 2021-10-01“…Current text similarity detection methods that ignore document structure information and lack semantic relevance.To solve these problems, a text-oriented similarity detection method was proposed.First, analytic hierarchy process (AHP) was used to calculate word position weight to extract feature words.Second, the Pearson correlation coefficient was used to measure semantic correlation between words which was the weight of generalized Dice coefficient to calculate similarity.Experimental results show that the proposed method can improve the precision of feature word extraction and the accuracy of similarity calculation results.…”
Get full text
Article -
184
A YOLO-Based Method for Head Detection in Complex Scenes
Published 2024-11-01“…Secondly, it was found in practical operations that the original IoU function has a serious problem with overlapping detection in complex scenes. …”
Get full text
Article -
185
Fine-Grained Aircraft Recognition Based on Dynamic Feature Synthesis and Contrastive Learning
Published 2025-02-01“…Second, to tackle the long-tail distribution problem, we design a dynamic feature hallucination module that synthesizes diverse hallucinated samples, thereby improving the feature diversity of tail categories. …”
Get full text
Article -
186
Enhanced UAV Detection and Classification With Birds Using NLFM Pulse-Doppler Radar
Published 2025-01-01“…Detecting UAVs in clutter environments and classification with birds is a difficult and important problem. …”
Get full text
Article -
187
Improving small object detection via cross-layer attention
Published 2025-07-01“…To detect small objects in images, several methods rely on feature pyramid networks (FPN), which can alleviate the conflict between resolution and semantic information. …”
Get full text
Article -
188
Face morphing detection in the presence of printing/scanning and heterogeneous image sources
Published 2021-05-01Get full text
Article -
189
BG-YOLO: A Bidirectional-Guided Method for Underwater Object Detection
Published 2024-11-01“…To alleviate this problem, we proposed a bidirectional guided method for underwater object detection, referred to as BG-YOLO. …”
Get full text
Article -
190
WT-HMFF: Wavelet Transform Convolution and Hierarchical Multi-Scale Feature Fusion Network for Detecting Infrared Small Targets
Published 2025-07-01“…Yet, a persistent challenge remains: the lack of high-level semantic information may cause the disappearance of small target features in the network’s deep layers, ultimately impairing detection accuracy. …”
Get full text
Article -
191
Pixel-Based Change Detection in Moving-Camera Videos Using Twin Convolutional Features on a Data-Constrained Scenario
Published 2025-01-01“…To address these moving camera surveillance problems, the PBCD-MC method was developed based on a hybrid ensemble feature extractor, combining deep learning methods, responsible for generating high-level features, and tree-based algorithms, responsible for selecting and combining the deep features. …”
Get full text
Article -
192
The abnormal traffic detection scheme based on PCA and SSH
Published 2022-12-01“…At the same time, PCSS also combines feature fusion and SSH to enhance the feature extraction of unclear features data, and effectively improve the detection speed and accuracy. …”
Get full text
Article -
193
-
194
Flooded Infrastructure Change Detection in Deeply Supervised Networks Based on Multi-Attention-Constrained Multi-Scale Feature Fusion
Published 2024-11-01“…On the one hand, land cover data are not updated in time, resulting in the misjudgment of disaster losses; on the other hand, since buildings block floods, the above methods cannot detect flooded buildings. Automated change-detection methods can effectively alleviate the above problems. …”
Get full text
Article -
195
-
196
ID-insensitive deepfake detection model based on multi-attention mechanism
Published 2025-04-01“…However, existing methods frequently overlook the connection between local details and overall image features, while also failing to address the problem of implicit identity leakage. …”
Get full text
Article -
197
-
198
Hierarchical Knowledge Transfer: Cross-Layer Distillation for Industrial Anomaly Detection
Published 2025-03-01“…There are two problems with traditional knowledge distillation methods in industrial anomaly detection: first, traditional methods mostly use feature alignment between the same layers. …”
Get full text
Article -
199
Improved YOLOv8 Object Detection Method for Drone Aerial Images
Published 2025-06-01“…A new improved YOLOv8 drone aerial image object detection method, referred to as the BDI-YOLO model, is proposed to address the problems of small target object size and blurry feature information in drone aerial images, which can lead to missed and false detections. …”
Get full text
Article -
200
Research on Lightweight Small Object Detection Algorithm Based on Context Representation
Published 2025-04-01“…This framework model consists of three parts: a backbone network, a multi-scale feature representation network, and a detection head. …”
Get full text
Article