|
|
|
Changhong Liu, Jiawen Wen, Jinshan Huang, Weiren Lin, Bochun Wu, Ning Xie and Tao Zou
Underwater object detection is crucial in marine exploration, presenting a challenging problem in computer vision due to factors like light attenuation, scattering, and background interference. Existing underwater object detection models face challenges ...
ver más
|
|
|
|
|
|
|
Tong Liu, Hanlin Sheng, Zhaosheng Jin, Li Ding, Qian Chen, Rui Huang, Shengyi Liu, Jiacheng Li and Bingxiong Yin
This paper presents an effective method for measuring oil debris with high confidence to ensure the wear monitoring of aero-engines, which suffers from severe noise interference, weak signal characteristics, and false detection. First, an improved variat...
ver más
|
|
|
|
|
|
|
Jing Chen, Gang Zhou, Jicang Lu, Shiyu Wang and Shunhang Li
Fake news detection has become a significant topic based on the fast-spreading and detrimental effects of such news. Many methods based on deep neural networks learn clues from claim content and message propagation structure or temporal information, whic...
ver más
|
|
|
|
|
|
|
Norah Abanmi, Heba Kurdi and Mai Alzamel
The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The ma...
ver más
|
|
|
|
|
|
|
Qiwen Tian and Sumiko Miyata
To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express a cer...
ver más
|
|
|
|
|
|
|
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac...
ver más
|
|
|
|
|
|
|
Afnan Alotaibi and Murad A. Rassam
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks befo...
ver más
|
|
|
|
|
|
|
Rowa Aljondi, Salem Saeed Alghamdi, Abdulrahman Tajaldeen, Shareefah Alassiri, Monagi H. Alkinani and Thomas Bertinotti
Background: Breast cancer has a 14.8% incidence rate and an 8.5% fatality rate in Saudi Arabia. Mammography is useful for the early detection of breast cancer. Researchers have been developing artificial intelligence (AI) algorithms for early breast canc...
ver más
|
|
|
|
|
|
|
Xulong Yu, Qiancheng Yu, Qunyue Mu, Zhiyong Hu and Jincai Xie
Traditional manual visual detection methods are inefficient, subjective, and costly, making them prone to false and missed detections. Deep-learning-based defect detection identifies the types of defects and pinpoints their locations. By employing this a...
ver más
|
|
|
|
|
|
|
Hao Sun, Yuejin Du and Qi Li
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi...
ver más
|
|
|
|