109   Artículos

 
en línea
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch    
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are dep... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Woonghee Lee and Younghoon Kim    
This study introduces a deep-learning-based framework for detecting adversarial attacks in CT image segmentation within medical imaging. The proposed methodology includes analyzing features from various layers, particularly focusing on the first layer, a... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ping Dong, Kuo Li, Ming Wang, Feitao Li, Wei Guo and Haiping Si    
In addition to the conventional situation of detecting a single disease on a single leaf in corn leaves, there is a complex phenomenon of multiple diseases overlapping on a single leaf (compound diseases). Current research on corn leaf disease detection ... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Zhichao Chen, Guoqiang Wang, Tao Lv and Xu Zhang    
Diseases of tomato leaves can seriously damage crop yield and financial rewards. The timely and accurate detection of tomato diseases is a major challenge in agriculture. Hence, the early and accurate diagnosis of tomato diseases is crucial. The emergenc... ver más
Revista: Agronomy    Formato: Electrónico

 
en línea
Chenglin Yang, Dongliang Xu and Xiao Ma    
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sharoug Alzaidy and Hamad Binsalleeh    
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Baris Yigin and Metin Celik    
In recent years, advanced methods and smart solutions have been investigated for the safe, secure, and environmentally friendly operation of ships. Since data acquisition capabilities have improved, data processing has become of great importance for ship... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma    
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Afnan Alotaibi and Murad A. Rassam    
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks befo... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Recent ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly ou... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 7     Siguiente »