-
81
Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks
Published 2015-06-01“…The present paper introduces a novel data loss/modification detection and recovery scheme in this context. Both elements, detection and data recovery, rely on a multivariate statistical analysis approach that exploits spatial density, a common feature in network environments such as WSNs. …”
Get full text
Article -
82
GDSN-CD: Graph-Guided Diffusion Synergistic Network for Remote Sensing Change Detection
Published 2025-01-01“…Remote sensing change detection often faces the challenge of accurately capturing discontinuous change features in complex scenes. …”
Get full text
Article -
83
A Robust Opinion Spam Detection Method Against Malicious Attackers in Social Media
Published 2025-04-01“…This paper proposes a novel multi-layer graph-based method that represents reviews, reviewers, and products as interconnected nodes. This approach captures the complex relationships among them and addresses adversarial attempts to manipulate the detection process. …”
Get full text
Article -
84
Online Banking Fraud Detection Model: Decentralized Machine Learning Framework to Enhance Effectiveness and Compliance with Data Privacy Regulations
Published 2025-06-01“…The research methodology applied robust preprocessing, the implementation of a compact autoencoder architecture, and a threshold-based anomaly detection strategy. Evaluation metrics, such as confusion matrices, receiver operating characteristic (ROC) curves, precision–recall (PR) curves, and reconstruction error distributions, are used to assess the model’s performance. …”
Get full text
Article -
85
Towards saturation attack detection in SDN: a multi-edge representation learning-based method
Published 2025-07-01“…The proposed method includes a novel graph construction strategy that generates Multi-edge Communication Flow Graphs (MCF-Graphs), and an edge representation learning model, Node-Edge Relationship GraphSAGE (NER-SAGE), for detecting saturation attack flows. …”
Get full text
Article -
86
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01“…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
Get full text
Article -
87
Deployment cost minimization for composite event detection in large-scale heterogeneous wireless sensor networks
Published 2017-06-01“…How to use as few sensor nodes as possible to detect composite event in large area is a difficult problem because multiple heterogeneous sensor nodes are required for detecting the composite event which consists of several atomic events, and the detection accuracy would be worse if there are no enough sensor nodes. …”
Get full text
Article -
88
Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks
Published 2022-01-01“…By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. …”
Get full text
Article -
89
Tumor characteristics and survival rate of axillary metastatic breast cancer patients: a three decades retrospective cohort study
Published 2025-02-01“…Conclusion: The axillary lymph node status has been considered as one of the fundamental factors determining the therapeutic strategy and prognosis of BC patients, which has an association with tumor characteristics. …”
Get full text
Article -
90
Spark-Based Label Diffusion and Label Selection Community Detection Algorithm for Metagenome Sequence Clustering
Published 2023-11-01“…In SpaRC, sequences are defined as nodes and clustered by a parallel label propagation algorithm (LPA). …”
Get full text
Article -
91
Dynamic Sensor-Based Data Management Optimization Strategy of Edge Artificial Intelligence Model for Intelligent Transportation System
Published 2025-03-01“…By doing so, it meets the real-time computing requirements of intelligent transportation business applications. By adopting node and sensor management mechanisms as well as efficient communication protocols, dynamic sensor-based data management of AI algorithm models was achieved, such as pedestrian object recognition, vehicle object detection, and ship object positioning. …”
Get full text
Article -
92
TCN-Based DDoS Detection and Mitigation in 5G Healthcare-IoT: A Frequency Monitoring and Dynamic Threshold Approach
Published 2025-01-01“…A dynamic threshold strategy also provides adaptive security by averaging detected malicious behavior messages across all nodes to determine the base threshold. …”
Get full text
Article -
93
Decentralized Detection and Mitigation of False Data Injection Attacks in DC Microgrids Using Artificial Neural Network
Published 2025-01-01“…In this framework, the MLP neural networks are trained offline using local data under various conditions and are subsequently deployed online within the distributed generator units for fault detection and mitigation. Resilience is achieved through a pinning-node consensus-based secondary control strategy, which enables attack detection via MLP on other units regardless of whether all units are pinned. …”
Get full text
Article -
94
SIGKD: A Structured Instance Graph Distillation Method for Efficient Object Detection in Remote Sensing Images
Published 2024-11-01“…Through carefully calibrated weights, this strategy effectively extracts and integrates background information, thereby minimizing noise interference in detection results and augmenting the expressive capacity of foreground features. …”
Get full text
Article -
95
Relapse detection in the Danish surveillance program of patients with clinical stage I seminoma: a nationwide study
Published 2025-01-01“…Background and purpose: Active surveillance is a recommended management strategy for patients with clinical stage I (CSI) seminoma. …”
Get full text
Article -
96
The scRNA-sequencing landscape of pancreatic ductal adenocarcinoma revealed distinct cell populations associated with tumor initiation and progression
Published 2025-05-01“…As a result, our study provides valuable insights for early detection of PDAC and promising therapeutic targets for combatting lymph node metastasis.…”
Get full text
Article -
97
Automated seizure detection in epilepsy using a novel dynamic temporal-spatial graph attention network
Published 2025-05-01“…The multi-head attention mechanism and dynamic graph generation strategy effectively resolve the temporal variability of functional connectivity. …”
Get full text
Article -
98
Fibrolamellar hepatocellular carcinoma: a case report and gene analysis
Published 2023-09-01Get full text
Article -
99
ESfix: An Embedded Program Repair Tool for Effective Removal of Concurrency Defects
Published 2025-03-01“…ESfix first utilizes the bug information reported by the defect detection tool to locate the repair region and extracts the node information corresponding to the defective code. …”
Get full text
Article -
100