|
|
|
Jiao Su, Yi An, Jialin Wu and Kai Zhang
Pedestrian detection has always been a difficult and hot spot in computer vision research. At the same time, pedestrian detection technology plays an important role in many applications, such as intelligent transportation and security monitoring. In comp...
ver más
|
|
|
|
|
|
|
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,...
ver más
|
|
|
|
|
|
|
Ghizlane Hnini, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy and Hamid Tairi
Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user?s computer system and take a long time to be deleted, which...
ver más
|
|
|
|
|
|
|
Thomas Schiller, Bruce Caulkins, Annie S. Wu and Sean Mondesire
Internet of Things (IoT) devices are common in today?s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation. To remedy these growing security weaknesses, this work proposes a new artificial intelligenc...
ver más
|
|
|
|
|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
|
Sabina Szymoniak, Filip Depta, Lukasz Karbowiak and Mariusz Kubanek
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Ar...
ver más
|
|
|
|
|
|
|
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu...
ver más
|
|
|
|
|
|
|
Michael Xevgenis, Dimitrios G. Kogias, Panagiotis A. Karkazis and Helen C. Leligou
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ...
ver más
|
|
|
|
|
|
|
Usman Javed Butt, Osama Hussien, Krison Hasanaj, Khaled Shaalan, Bilal Hassan and Haider al-Khateeb
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks. One way to ensure network security is by usin...
ver más
|
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|