-
261
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks
Published 2025-04-01“…Current Artificial Intelligence (AI) intrusion detection techniques turn intrusion detection into a classification problem, where AI excels. …”
Get full text
Article -
262
DSF-YOLO for robust multiscale traffic sign detection under adverse weather conditions
Published 2025-07-01“…This model employs an attention-based dynamic sequence fusion feature pyramid, which enhances recognition accuracy for small-target traffic sign instances in adverse weather, as opposed to traditional feature pyramid networks. …”
Get full text
Article -
263
Deep Learning Strategies for Detecting and Mitigating Cyber-Attacks Targeting Water-Energy Nexus
Published 2024-01-01“…The dataset employed in this study is characterized by its imbalanced nature, with cyber-attack instances being infrequent compared to normal instances. …”
Get full text
Article -
264
Application of Online Anomaly Detection Using One-Class Classification to the Z24 Bridge
Published 2024-12-01“…Additionally, we present a novel approach to manage drift through the application of entropy measures to structural state instances. The study is the first to assess the applicability of one-class classification for anomaly detection on the short-term structural health data of the Z24 bridge.…”
Get full text
Article -
265
Few-shot cybersecurity event detection method by data augmentation with prompting question answering
Published 2024-08-01“…A few-shot cybersecurity event detection method by data augmentation with prompting question answering was proposed. …”
Get full text
Article -
266
Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system
Published 2019-10-01“…In this article, a soft-computing-based approach has been designed to reduce the false-positive rate for hierarchical data of anomaly-based intrusion detection system. The recurrent neural network model is applied to classify the data set of intrusion detection system and normal instances for various subclasses. …”
Get full text
Article -
267
Leveraging Swarm Intelligence for Invariant Rule Generation and Anomaly Detection in Industrial Control Systems
Published 2024-11-01“…Experimental validation using the Secure Water Treatment (SWaT) dataset demonstrates that the proposed approach can detect over 84% of attack instances, with precise anomaly localization achievable by examining as few as two to six sensor or actuator states. …”
Get full text
Article -
268
Innovative novel regularized memory graph attention capsule network for financial fraud detection.
Published 2025-01-01“…Financial fraud detection (FFD) is crucial for ensuring the safety and efficiency of financial transactions. …”
Get full text
Article -
269
A Public Dataset of Annotated Orcinus orca Acoustic Signals for Detection and Ecotype Classification
Published 2025-07-01“…This dataset, compiled from diverse sources, provides a comprehensive resource for the detection and classification of killer whale vocalizations. …”
Get full text
Article -
270
Acute Psychological Stress Detection Using Explainable Artificial Intelligence for Automated Insulin Delivery
Published 2024-07-01“…The SHAP technique is also used to explain the local signal importance for particular instances of misclassified samples. The detection of APS can inform multivariable automated insulin delivery systems to intervene to counteract the APS-induced glycemic excursions in people with type 1 diabetes.…”
Get full text
Article -
271
Securing IoT-Cloud Applications with AQ-KGMO-DMG Enhanced SVM for Intrusion Detection
Published 2025-02-01“…The utilization of the UNSW-NB15 dataset serves as the litmus test for evaluating the efficacy of the developed intrusion detection model. Notably, this approach enhances the accuracy in categorizing classes with minimal instances while concurrently mitigating the false alarm rate (FAR). …”
Get full text
Article -
272
Design of a Drowsiness Prevention Helmet with Vibration and IoT-Based Theft Detection Alarms
Published 2024-03-01“…The helmet theft detector uses a Sharp GP2Y0A21 sensor that can only detect object distances up to 10 cm. …”
Get full text
Article -
273
Facial and Neck Region Analysis for Deepfake Detection Using Remote Photoplethysmography Signal Similarity
Published 2024-01-01“…However, recent times have seen a surge in instances of DF technology misuse, raising concerns about cybercrime and the credibility of manipulated information. …”
Get full text
Article -
274
Detection and localization of copy-move tampering along with adversarial attack in a digital image
Published 2025-07-01“…In this paper, we propose a novel approach for copy-move tampering detection that leverages the SURF detector and BRISK descriptor. …”
Get full text
Article -
275
L2R-MLP: a multilabel classification scheme for the detection of DNS tunneling
Published 2025-09-01“…This highlights the effectiveness of L2 regularization in improving predictive capabilities and model generalization for unseen instances.…”
Get full text
Article -
276
Defect detection in photolithographic patterns using deep learning models trained on synthetic data
Published 2025-05-01“…When tested on real SEM data, the YOLOv8 model correctly detected 84.6% of Bridge defects and 78.3% of Break defects across all relevant instances. …”
Get full text
Article -
277
Driver drowsiness shield (DDSH): a real-time driver drowsiness detection system
Published 2025-05-01“…The application analyzes real-time video streams, detects faces and eyes, and uses instances of closed eyelids to predict signs of drowsiness. …”
Get full text
Article -
278
Improved LightGBM for Extremely Imbalanced Data and Application to Credit Card Fraud Detection
Published 2024-01-01“…EID involves extremely few instances of fraud for training and an extremely high risk of overlooking fraud. …”
Get full text
Article -
279
An intelligent intrusion detection system for cyber-physical systems using GAN-LSTM networks
Published 2025-06-01“…Cyber-Physical Systems (CPS) face increasing cybersecurity threats, demanding advanced intrusion detection methods. This research proposes a novel GAN-LSTM hybrid model to enhance anomaly detection in CPS by addressing key limitations of traditional approaches, including class imbalance and temporal dependency learning. …”
Get full text
Article -
280
Bi-temporal Gaussian feature dependency guided change detection in remote sensing images
Published 2025-08-01“…Change detection (CD) enables the identification of alterations between images of the same area captured at different times. …”
Get full text
Article