We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Gaming the system: tetromino-based covert channel and its impact on mobile security

    Trojan droppers consistently emerge as challenging malware threats, particularly within the Android ecosystem. Traditional malware detection...

    Efstratios Vasilellis, Vasileios Botsos, ... Dimitris Gritzalis in International Journal of Information Security
    Article 28 June 2024
  2. Motioninsights: real-time object tracking in streaming video

    MotionInsights facilitates object detection and tracking from multiple video streams in real-time. Leveraging the distributed stream processing...

    Dimitrios Banelas, Euripides G. M. Petrakis in Machine Vision and Applications
    Article 27 June 2024
  3. Distributed AgriFood Supply Chains

    In Agrifood scenarios, where farmers need to ensure that their produce is safely produced, transported, and stored, they rely on a network of IoT...

    Hélio Pesanhane, Wesley R. Bezerra, ... Carlos Westphall in Journal of Network and Systems Management
    Article 27 June 2024
  4. A multi-modal framework for continuous and isolated hand gesture recognition utilizing movement epenthesis detection

    Gesture recognition, having multitudinous applications in the real world, is one of the core areas of research in the field of human-computer...

    Navneet Nayan, Debashis Ghosh, Pyari Mohan Pradhan in Machine Vision and Applications
    Article 27 June 2024
  5. Optimization-based convolutional neural model for the classification of white blood cells

    White blood cells (WBCs) are one of the most significant parts of the human immune system, and they play a crucial role in diagnosing the...

    Tulasi Gayatri Devi, Nagamma Patil in Journal of Big Data
    Article Open access 26 June 2024
  6. Acnn: arbitrary trace attacks based on leakage area detection

    Deep Learning-based Side-Channel Analysis (DL-SCA) has emerged as a powerful method in the field of side-channel analysis. Current works on DL-SCA...

    Article 26 June 2024
  7. Technology is key to green coal mining

    Greening of coal through sustainable mining in India requires extensive deployment of technology. This article briefly highlights the role of...

    Rajiv Shekhar, Sheo Shankar Rai in CSI Transactions on ICT
    Article 25 June 2024
  8. Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain

    Smart contracts are decentralized applications that hold a pivotal role in blockchain-based systems. Smart contracts are composed of error-prone...

    Van Tong, Cuong Dao, ... Sami Souihi in Journal of Network and Systems Management
    Article 24 June 2024
  9. Four development stages of collective intelligence

    The new generation of artificial intelligence (AI) research initiated by Chinese scholars conforms to the needs of a new information environment...

    Article 22 June 2024
  10. Suno: potential, prospects, and trends

    Jiaxing Yu, Songruoyao Wu, ... Kejun Zhang in Frontiers of Information Technology & Electronic Engineering
    Article 20 June 2024
  11. Generation of realistic synthetic cable images to train deep learning segmentation models

    Semantic segmentation is one of the most important and studied problems in machine vision, which has been solved with high accuracy by many deep...

    Pablo MalvidoFresnillo, Wael M. Mohammed, ... Jose L. MartinezLastra in Machine Vision and Applications
    Article Open access 20 June 2024
  12. Performance analysis of various deep learning models based on Max-Min CNN for lung nodule classification on CT images

    Lung cancer remains one of the leading causes of cancer-related deaths worldwide, underlining the urgent need for accurate and early detection and...

    Rekka Mastouri, Nawres Khlifa, ... Saoussen Hantous-Zannad in Machine Vision and Applications
    Article 20 June 2024
  13. RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels

    In this work, we investigate Reconfigurable Intelligent Surface (RIS)-aided Full-Duplex (FD)-Simultaneous Wireless Information Power Transfer...

    Wilson de Souza Jr., Taufik Abrão in Journal of Network and Systems Management
    Article 19 June 2024
  14. Dual contrast discriminator with sharing attention for video anomaly detection

    The detection of video anomalies is a well-known issue in the realm of visual research. The volume of normal and abnormal sample data in this field...

    Yiwenhao Zeng, Yihua Chen, ... Fang Xu in Machine Vision and Applications
    Article 19 June 2024
  15. A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement

    This work describes an approach to enhance container orchestration platforms with an autonomous and dynamic rescheduling system that aims at...

    Vincent Bracke, José Santos, ... Bruno Volckaert in Journal of Network and Systems Management
    Article 18 June 2024
  16. Swarm-intelligence for the modern ICT ecosystems

    Digitalization is continuing facilitating our daily lives. The world is interconnected as never before, bringing close people, businesses, or other...

    George Hatzivasilis, Eftychia Lakka, ... Stephan Kiefer in International Journal of Information Security
    Article 18 June 2024
  17. Advanced RIME architecture for global optimization and feature selection

    The article introduces an innovative approach to global optimization and feature selection (FS) using the RIME algorithm, inspired by RIME-ice...

    Ruba Abu Khurma, Malik Braik, ... Bilal Abu-Salih in Journal of Big Data
    Article Open access 18 June 2024
  18. A dynamic C-V2X anonymous authentication and group key agreement protocol

    At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named...

    Beibei Cui, Wei He, Yan Cui in International Journal of Information Security
    Article 18 June 2024
  19. Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches

    Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding,...

    **anfeng Li, Haoran Sun, Yan Huang in Journal of Network and Systems Management
    Article 18 June 2024
Did you find what you were looking for? Share feedback.