We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Underdetermined mixing matrix estimation based on time-frequency single source points detection and eigenvalue decomposition

    In this paper, a method of mixing matrix estimation based on time-frequency single source points detection and eigenvalue decomposition is proposed...

    Pengcheng Bai, Yunxiu Yang, ... Qin Shu in Signal, Image and Video Processing
    Article 04 January 2022
  2. An experimental study of existing tools for outlier detection and cleaning in trajectories

    Outlier detection and cleaning are essential steps in data preprocessing to ensure the integrity and validity of data analyses. This paper focuses on...

    Mariana M Garcez Duarte, Mahmoud Sakr in GeoInformatica
    Article 18 May 2024
  3. Face Detection

    Face detection is the first step of most face-related applications such as face recognition, face tracking, facial expression recognition, facial...
    Shiqi Yu, Yuantao Feng, ... Jianguo Zhang in Handbook of Face Recognition
    Chapter 2024
  4. Low-light DEtection TRansformer (LDETR): object detection in low-light and adverse weather conditions

    Object detection has recently gained popularity mainly due to the development of deep learning techniques. However, undesirable noise challenges...

    Alok Kumar Tiwari, Manisha Pattanaik, G. K. Sharma in Multimedia Tools and Applications
    Article 11 April 2024
  5. SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN

    Due to the advantages of multi-source, multi-path, and in-network caching, Named Data Networking (NDN) can improve the efficiency of data exchange in...
    Yuwei Xu, Tiantian Zhang, ... **gdong Xu in Ubiquitous Security
    Conference paper 2024
  6. Detection

    Intrusion detection represents a fundamental security function. It consists of monitoring network traffic and host processes for suspicious activity,...
    Elisa Bertino, Sonam Bhardwaj, ... Ashraf Y. Mahgoub in Machine Learning Techniques for Cybersecurity
    Chapter 2023
  7. Multilinguality in Misinformation Detection

    This chapter examines the value of multilingualism and how it can be used to address different NLP issues. It first presents a multilingual...
    Asif Ekbal, Rina Kumari in Dive into Misinformation Detection
    Chapter 2024
  8. System Intrusion Detection and Prevention

    Psychologically there is value attached to ownership of an asset. How much is spent on protecting the asset determines the value of the asset. Once a...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  9. Network intrusion detection and prevention strategy with data encryption using hybrid detection classifier

    Advances in technology and communication have led to an increase in data and network sizes. As a result, many intrusions (attacks) are created and...

    C. Pradeepthi, B. Uma Maheswari in Multimedia Tools and Applications
    Article 30 September 2023
  10. Multimodality in Misinformation Detection

    The fifth chapter explores the importance of multimodality in solving various NLP tasks. It begins with the discussion of the basic introduction of...
    Asif Ekbal, Rina Kumari in Dive into Misinformation Detection
    Chapter 2024
  11. AI-Based Android Malware Detection Methods

    With the support of artificial intelligence technology, the integration of program analysis techniques and machine learning algorithms has gradually...
    Weina Niu, **aosong Zhang, ... Jiacheng Gong in Android Malware Detection and Adversarial Methods
    Chapter 2024
  12. Context-guided coarse-to-fine detection model for bird nest detection on high-speed railway catenary

    As a critical component of ensuring the safe and stable operation of trains, the detection of bird’s nests on the rail catenary has always been...

    Hongwei Zhao, Siquan Wu, ... Shengchun Wang in Multimedia Systems
    Article Open access 26 July 2023
  13. Future Trends in Android Malware Detection

    To effectively protect users’ security, the field of Android malware detection is constantly evolving. Various technical means, such as static...
    Weina Niu, **aosong Zhang, ... Jiacheng Gong in Android Malware Detection and Adversarial Methods
    Chapter 2024
  14. Academic Plagiarism Detection

    This chapter provides background information on academic plagiarism and reviews technical approaches to detect it. Section Chapter 1 derives a...
    Chapter 2023
  15. Photovoltaic glass edge defect detection based on improved SqueezeNet

    With the global energy shortage, countries all over the world are vigorously develo** new energy sources, and photovoltaic glass, as an important...

    Jie **ong, Ziguo He, ... Ruyi Yang in Signal, Image and Video Processing
    Article 10 January 2024
  16. Enhancing stance detection through sequential weighted multi-task learning

    The exponential growth of user-generated content on social media platforms, online news outlets, and digital communication has necessitated the...

    Nora Alturayeif, Hamzah Luqman, Moataz Ahmed in Social Network Analysis and Mining
    Article 09 December 2023
  17. A review of 3D object detection based on autonomous driving

    3D object detection is a popular research direction in recent years, which plays an important role in the fields of automatic driving, intelligent...

    Huijuan Wang, **nyue Chen, ... Peng Liu in The Visual Computer
    Article 14 June 2024
  18. MDL Change Detection

    In this chapter, we show an application of the MDL principle to change detection. It is one of most practically important issues in data science,...
    Chapter 2023
  19. Multi-source-free Domain Adaptive Object Detection

    To enhance the transferability of object detection models in real-world scenarios where data is sampled from disparate distributions, considerable...

    Sicheng Zhao, Huizai Yao, ... Guiguang Ding in International Journal of Computer Vision
    Article 11 July 2024
  20. A gradient based dual detection model for shot boundary detection

    An efficient video shot boundary detection is highly desirable for subsequent semantic video content analysis and retrieval applications. The major...

    T. Kar, P. Kanungo in Multimedia Tools and Applications
    Article 08 August 2022
Did you find what you were looking for? Share feedback.