Showing 81 - 100 results of 302 for search 'node detection strategy', query time: 0.11s Refine Results
  1. 81

    Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks by Roberto Magán-Carrión, José Camacho, Pedro García-Teodoro

    Published 2015-06-01
    “…The present paper introduces a novel data loss/modification detection and recovery scheme in this context. Both elements, detection and data recovery, rely on a multivariate statistical analysis approach that exploits spatial density, a common feature in network environments such as WSNs. …”
    Get full text
    Article
  2. 82

    GDSN-CD: Graph-Guided Diffusion Synergistic Network for Remote Sensing Change Detection by Yunfei Zhu, Jintao Song, Jinjiang Li

    Published 2025-01-01
    “…Remote sensing change detection often faces the challenge of accurately capturing discontinuous change features in complex scenes. …”
    Get full text
    Article
  3. 83

    A Robust Opinion Spam Detection Method Against Malicious Attackers in Social Media by Amir Jalaly Bidgoly, Zolikha Rahmanian, Abbas Dehghani

    Published 2025-04-01
    “…This paper proposes a novel multi-layer graph-based method that represents reviews, reviewers, and products as interconnected nodes. This approach captures the complex relationships among them and addresses adversarial attempts to manipulate the detection process. …”
    Get full text
    Article
  4. 84

    Online Banking Fraud Detection Model: Decentralized Machine Learning Framework to Enhance Effectiveness and Compliance with Data Privacy Regulations by Hisham AbouGrad, Lakshmi Sankuru

    Published 2025-06-01
    “…The research methodology applied robust preprocessing, the implementation of a compact autoencoder architecture, and a threshold-based anomaly detection strategy. Evaluation metrics, such as confusion matrices, receiver operating characteristic (ROC) curves, precision–recall (PR) curves, and reconstruction error distributions, are used to assess the model’s performance. …”
    Get full text
    Article
  5. 85

    Towards saturation attack detection in SDN: a multi-edge representation learning-based method by Zhangli Ji, Yunhe Cui, Yinyan Guo, Guowei Shen, Yi Chen, Chun Guo

    Published 2025-07-01
    “…The proposed method includes a novel graph construction strategy that generates Multi-edge Communication Flow Graphs (MCF-Graphs), and an edge representation learning model, Node-Edge Relationship GraphSAGE (NER-SAGE), for detecting saturation attack flows. …”
    Get full text
    Article
  6. 86

    Data poisoning attack detection approach for quality of service aware cloud API recommender system by Zhen CHEN, Wenchao QI, Taiyu BAO, Limin SHEN

    Published 2023-08-01
    “…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
    Get full text
    Article
  7. 87

    Deployment cost minimization for composite event detection in large-scale heterogeneous wireless sensor networks by Xiaoqing Dong, Lianglun Cheng, Gengzhong Zheng, Tao Wang

    Published 2017-06-01
    “…How to use as few sensor nodes as possible to detect composite event in large area is a difficult problem because multiple heterogeneous sensor nodes are required for detecting the composite event which consists of several atomic events, and the detection accuracy would be worse if there are no enough sensor nodes. …”
    Get full text
    Article
  8. 88

    Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks by Jung Sub Ahn, Tae Ho Cho

    Published 2022-01-01
    “…By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. …”
    Get full text
    Article
  9. 89

    Tumor characteristics and survival rate of axillary metastatic breast cancer patients: a three decades retrospective cohort study by Seyed Mohamad Sadegh Mousavi-kiasary, Mahdis Bayat, Fereshteh Abbasvandi, Batoul Khoundabi, Fatemeh Mousavi, Atieh Akbari, Maryam Bagherian, Afsoon Zandi, Behnam Honarvar, Mohammad Esmaeil Akbari

    Published 2025-02-01
    “…Conclusion: The axillary lymph node status has been considered as one of the fundamental factors determining the therapeutic strategy and prognosis of BC patients, which has an association with tumor characteristics. …”
    Get full text
    Article
  10. 90

    Spark-Based Label Diffusion and Label Selection Community Detection Algorithm for Metagenome Sequence Clustering by Zhengjiang Wu, Xuyang Wu, Junwei Luo

    Published 2023-11-01
    “…In SpaRC, sequences are defined as nodes and clustered by a parallel label propagation algorithm (LPA). …”
    Get full text
    Article
  11. 91

    Dynamic Sensor-Based Data Management Optimization Strategy of Edge Artificial Intelligence Model for Intelligent Transportation System by Nu Wen, Ying Zhou, Yang Wang, Ye Zheng, Yong Fan, Yang Liu, Yankun Wang, Minmin Li

    Published 2025-03-01
    “…By doing so, it meets the real-time computing requirements of intelligent transportation business applications. By adopting node and sensor management mechanisms as well as efficient communication protocols, dynamic sensor-based data management of AI algorithm models was achieved, such as pedestrian object recognition, vehicle object detection, and ship object positioning. …”
    Get full text
    Article
  12. 92

    TCN-Based DDoS Detection and Mitigation in 5G Healthcare-IoT: A Frequency Monitoring and Dynamic Threshold Approach by Mirza Akhi, Ciaran Eising, Lubna Luxmi Dhirani

    Published 2025-01-01
    “…A dynamic threshold strategy also provides adaptive security by averaging detected malicious behavior messages across all nodes to determine the base threshold. …”
    Get full text
    Article
  13. 93

    Decentralized Detection and Mitigation of False Data Injection Attacks in DC Microgrids Using Artificial Neural Network by Omid Danaei Koik, Shahram Karimi, Khaled M. Almustafa, Juliano Katrib

    Published 2025-01-01
    “…In this framework, the MLP neural networks are trained offline using local data under various conditions and are subsequently deployed online within the distributed generator units for fault detection and mitigation. Resilience is achieved through a pinning-node consensus-based secondary control strategy, which enables attack detection via MLP on other units regardless of whether all units are pinned. …”
    Get full text
    Article
  14. 94

    SIGKD: A Structured Instance Graph Distillation Method for Efficient Object Detection in Remote Sensing Images by Fangzhou Liu, Wenzhe Zhao, Haoxiang Qi, Guangyao Zhou

    Published 2024-11-01
    “…Through carefully calibrated weights, this strategy effectively extracts and integrates background information, thereby minimizing noise interference in detection results and augmenting the expressive capacity of foreground features. …”
    Get full text
    Article
  15. 95

    Relapse detection in the Danish surveillance program of patients with clinical stage I seminoma: a nationwide study by Niklas B. Lindahl, Jakob Lauritsen, Thomas Wagner, Gedske Daugaard, Mikkel Bandak

    Published 2025-01-01
    “…Background and purpose: Active surveillance is a recommended management strategy for patients with clinical stage I (CSI) seminoma. …”
    Get full text
    Article
  16. 96

    The scRNA-sequencing landscape of pancreatic ductal adenocarcinoma revealed distinct cell populations associated with tumor initiation and progression by Ying Wang, Zhouliang Bian, Lichao Xu, Guangye Du, Zihao Qi, Yanjie Zhang, Jiang Long, Wentao Li

    Published 2025-05-01
    “…As a result, our study provides valuable insights for early detection of PDAC and promising therapeutic targets for combatting lymph node metastasis.…”
    Get full text
    Article
  17. 97

    Automated seizure detection in epilepsy using a novel dynamic temporal-spatial graph attention network by Kunxian Yan, Xiangyu Luo, Lei Ye, Wenping Geng, Jian He, Jiliang Mu, Xiaojuan Hou, Xiang Zan, Jiuhong Ma, Fei Li, Le Zhang, Xiujian Chou

    Published 2025-05-01
    “…The multi-head attention mechanism and dynamic graph generation strategy effectively resolve the temporal variability of functional connectivity. …”
    Get full text
    Article
  18. 98
  19. 99

    ESfix: An Embedded Program Repair Tool for Effective Removal of Concurrency Defects by Jingwen Zhao, Yanxia Wu, Yan Fu, Shuyong Liu

    Published 2025-03-01
    “…ESfix first utilizes the bug information reported by the defect detection tool to locate the repair region and extracts the node information corresponding to the defective code. …”
    Get full text
    Article
  20. 100