-
701
Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment
Published 2018-04-01“…For addressing the problem of two typical types of distributed denial of service (DDoS) attacks in cloud environment,a DDoS attack detection and prevention scheme called SDCC based on software defined network (SDN) architecture was proposed.SDCC used a combination of bandwidth detection and data flow detection,utilized confidence-based filtering (CBF) method to calculate the CBF score of packets,judged the packet of CBF score below the threshold as an attacking packet,added its attribute information to the attack flow feature library,and sent the flow table to intercept it through SDN controller.Simulation results show that SDCC can detect and prevent different types of DDoS attacks effectively,and it has high detection efficiency,reduces the controller’s computation overhead,and achieves a low false positive rate.…”
Get full text
Article -
702
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article -
703
A LiDAR - camera fusion detection method based on weight allocation
Published 2025-01-01“…In automatic driving target detection problem, the neural network is applied to two methods, vision, and LiDAR. …”
Get full text
Article -
704
Real-Time Human Ear Detection Based on the Joint of Yolo and RetinaFace
Published 2021-01-01“…With these methods, plenty problems can be solve by the distinctiveness of ear features, such as recognizing human with mask or diagnose ear-related diseases. …”
Get full text
Article -
705
A novel pedestrian detection algorithm based on data fusion of face images
Published 2019-05-01“…Face recognition is the most popular method to detect and track pedestrian movement. During the face recognition process, feature classification ability and reliability are determined by the feature extraction methods. …”
Get full text
Article -
706
A hybrid Bi-LSTM and RBM approach for advanced underwater object detection.
Published 2024-01-01“…Additionally, this architecture handles variable-length sequences, mitigates the vanishing gradient problem, and achieves enhanced significance by capturing complex patterns in the data. …”
Get full text
Article -
707
A DR Detection Method Incorporating Multi-scale Techniques and Parallel Networks
Published 2024-02-01“… A PM-Net model ( Parallel Multi-scale Network) has been constructed to solve the problems of loss of key information and poor model robustness in the downsampling process of diabetic retinopathy ( DR) detection models. …”
Get full text
Article -
708
An edge detection method of pantograph carbon slide based on an improved Canny algorithm
Published 2023-07-01“…Aiming at the problems of inaccurate extraction, discontinuity and being susceptible to noise when the edge of a carbon slide is detected by using a traditional edge detection algorithm, an edge detection method of pantograph carbon slide based on an improved Canny algorithm was proposed in the paper. …”
Get full text
Article -
709
A Novel Quadrilateral Contour Disentangled Algorithm for Industrial Instrument Reading Detection
Published 2025-01-01“…However, existing methods fail to accurately read the display automatically due to incorrect labeling of the target box vertices, which arises from the vertex entanglement problem. To address these challenges, a novel Quadrilateral Contour Disentangled Detection Network (QCDNet) is proposed in this paper, which utilizes the quadrilateral disentanglement idea. …”
Get full text
Article -
710
Ensemble-based eye disease detection system utilizing fundus and vascular structures
Published 2025-06-01“…Traditional diagnostic methods, relying on manually analyzing images, often have problems making an early detection and with their accuracy and efficiency, largely due to the subjectivity of human judgment and the time-consuming nature of the process. …”
Get full text
Article -
711
Small target detection of bearing surface defects based on improved YOLOv5s.
Published 2025-01-01“…However, traditional detection methods have problems such as insufficient feature extraction for small targets and sensitivity to background interference. …”
Get full text
Article -
712
A novel criterion for crack detection in beam structures by frequency response functions
Published 2023-09-01“…However, the complex feature of FRF has not been thoroughly employed for structural damage detection. …”
Get full text
Article -
713
Research on underwater target detection error compensation based on improved binocular vision
Published 2024-11-01“…A novel binocular vision error compensation method is proposed to solve the major error compensation problem caused by nonlinear distortion of camera and projector on underwater target detection. …”
Get full text
Article -
714
Detection Of Fire-Prone Areas In Attica Region Integrating Urban And Transport Aspect
Published 2020-10-01“…In Mediterranean climate areas, wildfires are one of the most critical problems bringing about several negative impacts (loss of human life, infrastructure damages, landscape transformation, natural environment deterioration, etc.). …”
Get full text
Article -
715
GCB‐YOLO: A Lightweight Algorithm for Wind Turbine Blade Defect Detection
Published 2025-06-01“…To address this problem, this paper introduces a lightweight wind turbine blade defect detection network, GCB‐YOLO, which attempts to maintain high detection accuracy and simultaneously achieve rapid detection speed. …”
Get full text
Article -
716
Tea Disease Detection Method Based on Improved YOLOv8 in Complex Background
Published 2025-07-01“…In order to solve the problems such as mutual occlusion of leaves, light disturbance, and small lesion area under complex background, YOLO-SSM, a tea disease detection model, was proposed in this paper. …”
Get full text
Article -
717
Cumulative confidence-driven task offloading for object detection in maritime Internet of Things
Published 2025-07-01“…However, the dynamic marine network and environmental interference in feature extraction adversely affect detection accuracy and cause delay. …”
Get full text
Article -
718
Deep Learning and Its Application in the Field of Rail Transit
Published 2018-01-01“…It introduced the current state of deep learning and its application in the field of rail transit, including identification, driver fatigue detection, lane detection and vehicle recognition equipment fault detection. …”
Get full text
Article -
719
Tongue Color Analysis and Diseases Detection Based on a Computer Vision System
Published 2023-03-01Get full text
Article -
720
MEViT: Generalization of Deepfake Detection With Meta-Learning EfficientNet Vision Transformer
Published 2025-01-01“…With the rapid advances in deep generative models, the accessibility and sophistication of such manipulation technologies are increasing, making it more challenging to detect fake content. Different facial forgery techniques result in complex data distributions, and most existing deepfake detection approaches rely on convolutional neural networks (CNNs) that treat the task as a binary classification problem. …”
Get full text
Article