|
|
|
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are dep...
ver más
|
|
|
|
|
|
|
Woonghee Lee and Younghoon Kim
This study introduces a deep-learning-based framework for detecting adversarial attacks in CT image segmentation within medical imaging. The proposed methodology includes analyzing features from various layers, particularly focusing on the first layer, a...
ver más
|
|
|
|
|
|
|
Ping Dong, Kuo Li, Ming Wang, Feitao Li, Wei Guo and Haiping Si
In addition to the conventional situation of detecting a single disease on a single leaf in corn leaves, there is a complex phenomenon of multiple diseases overlapping on a single leaf (compound diseases). Current research on corn leaf disease detection ...
ver más
|
|
|
|
|
|
|
Zhichao Chen, Guoqiang Wang, Tao Lv and Xu Zhang
Diseases of tomato leaves can seriously damage crop yield and financial rewards. The timely and accurate detection of tomato diseases is a major challenge in agriculture. Hence, the early and accurate diagnosis of tomato diseases is crucial. The emergenc...
ver más
|
|
|
|
|
|
|
Chenglin Yang, Dongliang Xu and Xiao Ma
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced...
ver más
|
|
|
|
|
|
|
Sharoug Alzaidy and Hamad Binsalleeh
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,...
ver más
|
|
|
|
|
|
|
Baris Yigin and Metin Celik
In recent years, advanced methods and smart solutions have been investigated for the safe, secure, and environmentally friendly operation of ships. Since data acquisition capabilities have improved, data processing has become of great importance for ship...
ver más
|
|
|
|
|
|
|
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec...
ver más
|
|
|
|
|
|
|
Afnan Alotaibi and Murad A. Rassam
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks befo...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Recent ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly ou...
ver más
|
|
|
|