Showing 261 - 280 results of 1,153 for search 'instance detection', query time: 0.09s Refine Results
  1. 261

    APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks by Xin Su, Guifu Zhang

    Published 2025-04-01
    “…Current Artificial Intelligence (AI) intrusion detection techniques turn intrusion detection into a classification problem, where AI excels. …”
    Get full text
    Article
  2. 262

    DSF-YOLO for robust multiscale traffic sign detection under adverse weather conditions by Jun Li, QinWen Deng, WenXin Gao, Bing Yang, Lan Jia, Ju Zhou, HaiBo Pu

    Published 2025-07-01
    “…This model employs an attention-based dynamic sequence fusion feature pyramid, which enhances recognition accuracy for small-target traffic sign instances in adverse weather, as opposed to traditional feature pyramid networks. …”
    Get full text
    Article
  3. 263

    Deep Learning Strategies for Detecting and Mitigating Cyber-Attacks Targeting Water-Energy Nexus by Ahmed Abughali, Mohamad Alansari, Ameena S. Al-Sumaiti

    Published 2024-01-01
    “…The dataset employed in this study is characterized by its imbalanced nature, with cyber-attack instances being infrequent compared to normal instances. …”
    Get full text
    Article
  4. 264

    Application of Online Anomaly Detection Using One-Class Classification to the Z24 Bridge by Amro Abdrabo

    Published 2024-12-01
    “…Additionally, we present a novel approach to manage drift through the application of entropy measures to structural state instances. The study is the first to assess the applicability of one-class classification for anomaly detection on the short-term structural health data of the Z24 bridge.…”
    Get full text
    Article
  5. 265

    Few-shot cybersecurity event detection method by data augmentation with prompting question answering by TANG Mengmeng, GUO Yuanbo, ZHANG Han, BAI Qingchun, CHEN Qingli, ZHANG Bowen

    Published 2024-08-01
    “…A few-shot cybersecurity event detection method by data augmentation with prompting question answering was proposed. …”
    Get full text
    Article
  6. 266

    Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system by Parminder Singh, Sujatha Krishnamoorthy, Anand Nayyar, Ashish Kr Luhach, Avinash Kaur

    Published 2019-10-01
    “…In this article, a soft-computing-based approach has been designed to reduce the false-positive rate for hierarchical data of anomaly-based intrusion detection system. The recurrent neural network model is applied to classify the data set of intrusion detection system and normal instances for various subclasses. …”
    Get full text
    Article
  7. 267

    Leveraging Swarm Intelligence for Invariant Rule Generation and Anomaly Detection in Industrial Control Systems by Yunkai Song, Huihui Huang, Hongmin Wang, Qiang Wei

    Published 2024-11-01
    “…Experimental validation using the Secure Water Treatment (SWaT) dataset demonstrates that the proposed approach can detect over 84% of attack instances, with precise anomaly localization achievable by examining as few as two to six sensor or actuator states. …”
    Get full text
    Article
  8. 268

    Innovative novel regularized memory graph attention capsule network for financial fraud detection. by Xiangting Shi, Xiaochen Wang, Yakang Zhang, Xiaoyi Zhang, Manning Yu, Lihao Zhang

    Published 2025-01-01
    “…Financial fraud detection (FFD) is crucial for ensuring the safety and efficiency of financial transactions. …”
    Get full text
    Article
  9. 269
  10. 270

    Acute Psychological Stress Detection Using Explainable Artificial Intelligence for Automated Insulin Delivery by Mahmoud M. Abdel-Latif, Mudassir M. Rashid, Mohammad Reza Askari, Andrew Shahidehpour, Mohammad Ahmadasas, Minsun Park, Lisa Sharp, Lauretta Quinn, Ali Cinar

    Published 2024-07-01
    “…The SHAP technique is also used to explain the local signal importance for particular instances of misclassified samples. The detection of APS can inform multivariable automated insulin delivery systems to intervene to counteract the APS-induced glycemic excursions in people with type 1 diabetes.…”
    Get full text
    Article
  11. 271

    Securing IoT-Cloud Applications with AQ-KGMO-DMG Enhanced SVM for Intrusion Detection by Konduru Siva Naga Narasimharao, P. V. Lakshmi

    Published 2025-02-01
    “…The utilization of the UNSW-NB15 dataset serves as the litmus test for evaluating the efficacy of the developed intrusion detection model. Notably, this approach enhances the accuracy in categorizing classes with minimal instances while concurrently mitigating the false alarm rate (FAR). …”
    Get full text
    Article
  12. 272

    Design of a Drowsiness Prevention Helmet with Vibration and IoT-Based Theft Detection Alarms by Aditya Putra Perdana Prasetyo, Harlis Richard Sitorus, Rahmat Fadli Isnanto, Adi Hermansyah

    Published 2024-03-01
    “…The helmet theft detector uses a Sharp GP2Y0A21 sensor that can only detect object distances up to 10 cm. …”
    Get full text
    Article
  13. 273

    Facial and Neck Region Analysis for Deepfake Detection Using Remote Photoplethysmography Signal Similarity by Byeong Seon An, Hyeji Lim, Hyeon Ah Seong, Eui Chul Lee

    Published 2024-01-01
    “…However, recent times have seen a surge in instances of DF technology misuse, raising concerns about cybercrime and the credibility of manipulated information. …”
    Get full text
    Article
  14. 274

    Detection and localization of copy-move tampering along with adversarial attack in a digital image by Anjali Diwan, Anil K. Roy

    Published 2025-07-01
    “…In this paper, we propose a novel approach for copy-move tampering detection that leverages the SURF detector and BRISK descriptor. …”
    Get full text
    Article
  15. 275

    L2R-MLP: a multilabel classification scheme for the detection of DNS tunneling by Emmanuel Oluwatobi Asani, Mojiire Oluwaseun Ayoola, Emmanuel Tunbosun Aderemi, Victoria Oluwaseyi Adedayo-Ajayi, Joyce A. Ayoola, Oluwatobi Noah Akande, Jide Kehinde Adeniyi, Oluwambo Tolulope Olowe

    Published 2025-09-01
    “…This highlights the effectiveness of L2 regularization in improving predictive capabilities and model generalization for unseen instances.…”
    Get full text
    Article
  16. 276

    Defect detection in photolithographic patterns using deep learning models trained on synthetic data by Prashant P. Shinde, Priyadarshini P. Pai, Shashishekar P. Adiga, K. Subramanya Mayya, Yongbeom Seo, Myungsoo Hwang, Heeyoung Go, Changmin Park

    Published 2025-05-01
    “…When tested on real SEM data, the YOLOv8 model correctly detected 84.6% of Bridge defects and 78.3% of Break defects across all relevant instances. …”
    Get full text
    Article
  17. 277

    Driver drowsiness shield (DDSH): a real-time driver drowsiness detection system by Archita Bhanja, Dibyajyoti Parhi, Dipankar Gajendra, Kreetish Sinha, Arup Kumar Sahoo

    Published 2025-05-01
    “…The application analyzes real-time video streams, detects faces and eyes, and uses instances of closed eyelids to predict signs of drowsiness. …”
    Get full text
    Article
  18. 278

    Improved LightGBM for Extremely Imbalanced Data and Application to Credit Card Fraud Detection by Xiaosong Zhao, Yong Liu, Qiangfu Zhao

    Published 2024-01-01
    “…EID involves extremely few instances of fraud for training and an extremely high risk of overlooking fraud. …”
    Get full text
    Article
  19. 279

    An intelligent intrusion detection system for cyber-physical systems using GAN-LSTM networks by Md Shakil Siddique, Md. Ashikur Rahman Khan, Ishtiaq Ahammad, Nishu Nath, Joysri Rani Das, Fardowsi Rahman

    Published 2025-06-01
    “…Cyber-Physical Systems (CPS) face increasing cybersecurity threats, demanding advanced intrusion detection methods. This research proposes a novel GAN-LSTM hybrid model to enhance anomaly detection in CPS by addressing key limitations of traditional approaches, including class imbalance and temporal dependency learning. …”
    Get full text
    Article
  20. 280

    Bi-temporal Gaussian feature dependency guided change detection in remote sensing images by Yi Xiao, Bin Luo, Jun Liu, Xin Su, Wei Wang

    Published 2025-08-01
    “…Change detection (CD) enables the identification of alterations between images of the same area captured at different times. …”
    Get full text
    Article