-
161
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
162
Detection and tracking of mask wearing based on deep learning
Published 2022-05-01“…Based on the YOLOv3 network, the spatial pyramid pooling structure is introduced into the detection module to realize the feature fusion at different scales, then the loss function is changed to CIoU loss to reduce the regression error improve detection accuracy, and provides good conditions for the subsequent tracking module. …”
Get full text
Article -
163
Weak Signal Detection Algorithm Based on Particle Filtering
Published 2025-06-01“…Firstly, by modifying the likelihood ratio function, the influence of clutter on the detection probability is restricted. …”
Get full text
Article -
164
Mitochondrial respiratory function induces endogenous hypoxia.
Published 2014-01-01“…Hypoxia influences many key biological functions. In cancer, it is generally believed that hypoxic condition is generated deep inside the tumor because of the lack of oxygen supply. …”
Get full text
Article -
165
-
166
UAV-to-Ground Target Detection Based on YOLO-DSBE
Published 2025-04-01“…The algorithm deeply integrates the BiFormer dynamic sparse attention mechanism into the improved feature fusion network, eliminating irrelevant feature information, enhancing the focus on pertinent details, and reducing the missed detection rate. Moreover, the EIoU boundary loss function is incorporated to address the ineffectiveness of the CIoU shape penalty term, enhancing model convergence speed and detection accuracy. …”
Get full text
Article -
167
-
168
Robust Corner Detection Using Local Extrema Differences
Published 2024-01-01“…It achieves better accuracy in corner localization and reduces both missed detections and false positives. …”
Get full text
Article -
169
Adaptive weight optimization with large pretraining for pest detection
Published 2025-12-01“…Frequent infestations by agricultural pests reduce crop production and significantly affect economic efficiency. …”
Get full text
Article -
170
Improved YOLO for long range detection of small drones
Published 2025-04-01“…Inspired by ARM CPU efficiency optimizations, the model uses depthwise separable convolutions and efficient activation functions to reduce parameter size. The neck structure is enhanced with a collaborative attention mechanism and multi-scale fusion, improving feature representation. …”
Get full text
Article -
171
Social functioning of elderly persons with malignant diseases
Published 2015-01-01“…Malignant disease, its treatment and consequences of treatment can often lead to social marginalization and reduced quality of life. The aim of this research was to determine how elderly patients with malignant diseases function in their social environment. …”
Get full text
Article -
172
Deep learning-enhanced signal detection for communication systems.
Published 2025-01-01“…Overall, the research model has achieved significant results in improving detection accuracy, optimizing real-time performance, and reducing resource consumption. …”
Get full text
Article -
173
GE-YOLO for Weed Detection in Rice Paddy Fields
Published 2025-03-01“…It introduces the Neck network with the Gold-YOLO feature aggregation and distribution network to enhance the network’s ability to fuse multi-scale features and detect weeds of different sizes. Additionally, an EMA attention mechanism is used to better learn weed feature representations, while a GIOU loss function provides smoother gradients and reduces computational complexity. …”
Get full text
Article -
174
Spatial Shape-Aware Network for Elongated Target Detection
Published 2025-02-01“…In remote sensing detection, targets often exhibit unique characteristics such as elongated shapes, multi-directional rotations, and significant scale variations. …”
Get full text
Article -
175
Colorectal Cancer Detection Tool Developed with Neural Networks
Published 2025-07-01“…The GUI is composed of two panels, with the best ANN model and the best CNN model being utilized in each. The primary function of the tool is to assist medical personnel in reducing the time required to make decisions and the probability of misdiagnosis.…”
Get full text
Article -
176
Image Processing for Laser Impact Detection in Shooting Simulators
Published 2025-03-01“…Simulation systems play a crucial role in firearms training by offering advantages such as the progressive improvement of shooting skills, reduced logistical costs, ammunition savings, and decreased need for personnel deployment to shooting ranges. …”
Get full text
Article -
177
Optimized spectral indices for camouflage detection in multispectral imagery
Published 2025-12-01“…Given the heavy use and utility of such indices, this work introduces a novel generalization of the normalized difference, ratio and difference indices, the linear ratio index (LRI), a ratio of two linear functions of all available bands. In addition, an optimization approach for the LRI is presented, which incorporates complexity reduction strategies that enable optimization using only a subset of all available bands and reduced parameter precision, thereby ensuring parameter readability. …”
Get full text
Article -
178
Alzheimer disease stages identification based on correlation transfer function system using resting-state functional magnetic resonance imaging.
Published 2022-01-01“…Alzheimer's disease (AD) affects the quality of life as it causes; memory loss, difficulty in thinking, learning, and performing familiar tasks. Resting-state functional magnetic resonance imaging (rs-fMRI) has been widely used to investigate and analyze different brain regions for AD identification. …”
Get full text
Article -
179
Research on pedestrian detection technology for mining unmanned vehicles
Published 2024-10-01“…This algorithm decomposed low-light images from the RGB color space into the HSV color space, applied a Logarithm function to enhance the V component, and employed a bilateral filter to reduce noise. …”
Get full text
Article -
180
Effects of acute sleep deprivation on the brain function of individuals with migraine: a resting-state functional magnetic resonance imaging study
Published 2025-03-01“…Conclusions In comparison to HCs, MWoA individuals exhibited significant alterations in brain function after ASD, particularly within the thalamus, and MWoA individuals exhibited a reduced within-network FC in DAN after ASD compared to baseline. …”
Get full text
Article