|
|
|
Xi Duan, Jian Liu and Xinjie Wang
The real-time simulation technology of large-scale open sea surfaces has been of great importance in fields such as computer graphics, ocean engineering, and national security. However, existing technologies typically have performance requirements or pla...
ver más
|
|
|
|
|
|
|
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,...
ver más
|
|
|
|
|
|
|
Jiao Su, Yi An, Jialin Wu and Kai Zhang
Pedestrian detection has always been a difficult and hot spot in computer vision research. At the same time, pedestrian detection technology plays an important role in many applications, such as intelligent transportation and security monitoring. In comp...
ver más
|
|
|
|
|
|
|
Endrowednes Kuantama, Avishkar Seth, Alice James and Yihao Zhang
The effectiveness of human security-based guard patrol systems often faces challenges related to the consistency of perimeter checks regarding timing and patterns. Some solutions use autonomous drones for monitoring assistance but primarily optimize thei...
ver más
|
|
|
|
|
|
|
Zhiguo Chen and Xuanyu Ren
In previous years, cybercriminals have utilized various strategies to evade identification, including obfuscation, confusion, and polymorphism technology, resulting in an exponential increase in the amount of malware that poses a serious threat to comput...
ver más
|
|
|
|
|
|
|
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ...
ver más
|
|
|
|
|
|
|
Sabina Szymoniak, Filip Depta, Lukasz Karbowiak and Mariusz Kubanek
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Ar...
ver más
|
|
|
|
|
|
|
Mauricio Diéguez, Carlos Cares, Cristina Cachero and Jorge Hochstetter
As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out co...
ver más
|
|
|
|
|
|
|
Amjad Alraizza and Abdulmohsen Algarni
Ransomware attacks pose significant security threats to personal and corporate data and information. The owners of computer-based resources suffer from verification and privacy violations, monetary losses, and reputational damage due to successful ransom...
ver más
|
|
|
|
|
|
|
Ghizlane Hnini, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy and Hamid Tairi
Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user?s computer system and take a long time to be deleted, which...
ver más
|
|
|
|