Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "Pest management science"
DOI: 10.1002/ps.7566
Abstract: BACKGROUND The acoustic detection model of activity signals based on deep learning could detect wood-boring pests accurately and reliably. However, the black-box characteristics of the deep learning model limited the credibility of the results and…
read more here.
Keywords:
interpretability;
activity;
model;
detection model ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-018-0786-3
Abstract: In recent years, security incidents of website occur increasingly frequently, and this motivates us to study websites’ security. Although there are many phishing detection approaches to detect phishing websites, the detection accuracy has not been…
read more here.
Keywords:
phishing detection;
detection;
detection model;
phishing websites ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "ISA transactions"
DOI: 10.1016/j.isatra.2017.08.018
Abstract: The detection of no-model input-output (IO) pairs is important because it can speed up the multivariable system identification process, since all the pairs with null transfer functions are previously discarded and it can also improve…
read more here.
Keywords:
output pairs;
input output;
loop systems;
model ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2868993
Abstract: More and more network traffic data have brought great challenge to traditional intrusion detection system. The detection performance is tightly related to selected features and classifiers, but traditional feature selection algorithms and classification algorithms can’t…
read more here.
Keywords:
detection;
network;
model;
detection model ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3168794
Abstract: Every day, hundreds of thousands of new malware programs are developed and spread worldwide in cyberspace. Most of these malware programs are malware variants such as polymorphic and metamorphic malware, which are created from older…
read more here.
Keywords:
malware variant;
variant detection;
detection model;
malware ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3229495
Abstract: A network intrusion detection system (IDS) is commonly recognized as an effective solution for identifying threats and malicious attacks. Due to the rapid emergence of threats and new attack vectors, novel and adaptive approaches must…
read more here.
Keywords:
intelligence detection;
threat intelligence;
detection;
model ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3257183
Abstract: In recent years, construction accidents have occurred frequently. The safety guarantee measures for construction personnel are thrown into sharp focus. Wearing helmets is one of the most important requirements to protect the safety of construction…
read more here.
Keywords:
safety;
wearing detection;
detection;
helmet wearing ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3262466
Abstract: Multi-vehicle tracking is one of the most crucial components of an intelligent transportation system (ITS). However, when it comes to busy traffic flow, tracking targets robustly becomes more problematic due to occlusion, motion blur, high…
read more here.
Keywords:
vehicle;
vehicle tracking;
detection model;
multi vehicle ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Instrumentation and Measurement"
DOI: 10.1109/tim.2023.3272391
Abstract: Nowadays, the digital twin method has been gradually applied to power equipment condition monitoring. Since a main fundamental part of the digital twin is a simulation process with better fitting for the real one, this…
read more here.
Keywords:
geometry;
transmission;
simulation;
process ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Knowledge and Data Engineering"
DOI: 10.1109/tkde.2020.3047857
Abstract: Mobile social networks include a large number of social members who forward messages cooperatively. However, spammers post links to viruses and advertisements, or follow a large number of users, which produces many misleading messages in…
read more here.
Keywords:
spammer detection;
adaptive social;
model;
spammer ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Smart Grid"
DOI: 10.1109/tsg.2022.3217060
Abstract: The network attack detection model based on machine learning (ML) has received extensive attention and research in PMU measurement data protection of power systems. However, well-trained ML-based detection models are vulnerable to adversarial attacks. By…
read more here.
Keywords:
detection model;
detection;
attack;
mitigation strategy ... See more keywords