We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,511 results
  1. Threat Object-based anomaly detection in X-ray images using GAN-based ensembles

    The problem of detecting dangerous or prohibited objects in luggage is a very important step during the implementation of Security setup at Airports,...

    Shreyas Kolte, Neelanjan Bhowmik, Dhiraj in Neural Computing and Applications
    Article 09 December 2022
  2. AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening

    X-ray baggage screening is a vitally important task to detect all kinds of threat objects at controlled access positions, which can prevent crime and...

    Yiru Wei, Zhiliang Zhu, ... Wei Zhang in Journal of Real-Time Image Processing
    Article 31 May 2021
  3. An autoML network traffic analyzer for cyber threat detection

    Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core...

    Alexandros Papanikolaou, Aggelos Alevizopoulos, ... Konstantinos Rantos in International Journal of Information Security
    Article 21 May 2023
  4. Cascaded structure tensor for robust baggage threat detection

    In the last two decades, baggage scanning has become one of the prime aviation security concerns worldwide. Manual screening of the baggage items is...

    Taimur Hassan, Samet Akcay, ... Naoufel Werghi in Neural Computing and Applications
    Article 05 March 2023
  5. Threat Detection in Self-Driving Vehicles Using Computer Vision

    On-road obstacle detection is an important field of research that falls in the scope of intelligent transportation infrastructure systems. The use of...
    Umang Goenka, Aaryan Jagetia, ... Poonam Saini in Machine Learning, Image Processing, Network Security and Data Sciences
    Conference paper 2023
  6. An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution

    X-ray baggage inspection is an essential task to detect threat objects at important controlled access places, which can guard personal safety and...

    Yiru Wei, Zhiliang Zhu, ... Wei Zhang in Journal of Real-Time Image Processing
    Article 02 January 2021
  7. Detection of threat objects in baggage inspection with X-ray images using deep learning

    In the field of security, baggage-screening with X-rays is used as nondestructive testing for threat object detection. This is a common protocol when...

    Daniel Saavedra, Sandipan Banerjee, Domingo Mery in Neural Computing and Applications
    Article 19 November 2020
  8. Programmable broad learning system for baggage threat recognition

    Detecting illegal and harmful objects in baggage at airports, subways, and bus stations has always been a difficult task that requires intense focus...

    Muhammad Shafay, Abdelfatah Ahmed, ... Naoufel Werghi in Multimedia Tools and Applications
    Article 13 July 2023
  9. Protection of Computational Machine Learning Models against Extraction Threat

    Abstract

    The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational...

    M. O. Kalinin, M. D. Soshnev, A. S. Konoplev in Automatic Control and Computer Sciences
    Article 01 December 2023
  10. Image Recognition and Threat Detection in Bags Arriving at the Airport

    International transport security policy requires the baggage screening. In airports and railway stations, these operations are processed manually...
    Ivan Koptev, Cameron Walker, Andreas W. Kempa-Liehr in Image and Video Technology
    Conference paper 2024
  11. APT-Dt-KC: advanced persistent threat detection based on kill-chain model

    Advanced persistent threat attacks are considered as a serious risk to almost any infrastructure since attackers are constantly changing and evolving...

    Maryam Panahnejad, Meghdad Mirabi in The Journal of Supercomputing
    Article 12 January 2022
  12. Event-Based Threat Intelligence Ontology Model

    Cyber Threat Intelligence (CTI) has become an essential part of contemporary threat detection and response solutions. However, threat intelligence is...
    Peng Wang, Guangxiang Dai, Lidong Zhai in Science of Cyber Security
    Conference paper 2023
  13. Privacy-Preserving Cyber Threat Information Sharing Leveraging FL-Based Intrusion Detection in the Financial Sector

    This paper presents an architectural proposal for enhancing anomaly detection in the CyberSec4Europe project use case Open Banking. It proposes a...
    Pablo Fernández Saura, Juan Francisco Martínez Gil, ... Antonio Skarmeta in Digital Sovereignty in Cyber Security: New Challenges in Future Vision
    Conference paper 2023
  14. Classification and Detection of Prohibited Objects in X-Ray Baggage Security Images

    Airport security is strengthened by baggage screening to prevent potential threats and ensure safety. Researchers have been striving to create more...
    Sintayehu Zekarias Esubalew, Ashenafi Kifleyohans Birhanu, Fikir Awoke Fantahun in Pan-African Conference on Artificial Intelligence
    Conference paper 2023
  15. Detection Method of Aggregated Floating Objects on Water Surface Based on Attention Mechanism and YOLOv3

    With the development of smart water conservancy construction, a realistic demand for using computer vision technology to assist in the supervision of...
    Jiannan Wang, Bingcai Chen in Artificial Intelligence in China
    Conference paper 2023
  16. TIM: threat context-enhanced TTP intelligence mining on unstructured threat data

    TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the...

    Yizhe You, Jun Jiang, ... Ning Li in Cybersecurity
    Article Open access 01 February 2022
  17. Detection of Objects Dangerous for the Operation of Mining Machines

    Deep learning was used to detect boulders that can damage excavators in opencast mines. Different network architectures were applied, i.e., modern...
    Jakub Szymkowiak, Marek Bazan, ... Tomasz Janiczek in Computational Science – ICCS 2023
    Conference paper 2023
  18. Threats and Threat Intelligence

    Digital technologies used in digital transformation are essential for every industrial, public, and private organization. In industry, the automation...
    Chapter 2023
  19. Visual Perception of Threat: Structure, Dynamics, and Individual Differences

    Efficient recognition of potential threats greatly enhances an organism’s chances of survival. This involves the ability to rapidly identify and...
    Chapter 2024
  20. Benchmarking Object Detection Robustness against Real-World Corruptions

    With the rapid recent development, deep learning based object detection techniques have been applied to various real-world software systems,...

    Jiawei Liu, Zhijie Wang, ... Zhenyu Chen in International Journal of Computer Vision
    Article 15 May 2024
Did you find what you were looking for? Share feedback.