Found: 51
Select item for more details and to access through your institution.
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, p. 1, doi. 10.1186/s13677-023-00584-7
- By:
- Publication type:
- Article
Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-024-00592-1
- By:
- Publication type:
- Article
An Adaptive DDoS Detection and Classification Method in Blockchain Using an Integrated Multi-Models.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 3, p. 3265, doi. 10.32604/cmc.2023.045588
- By:
- Publication type:
- Article
Gate-Attention and Dual-End Enhancement Mechanism for Multi-Label Text Classification.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 2, p. 1779, doi. 10.32604/cmc.2023.042980
- By:
- Publication type:
- Article
A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 47, n. 1, p. 975, doi. 10.32604/csse.2023.039280
- By:
- Publication type:
- Article
Blockchain Security Threats and Collaborative Defense: A Literature Review.
- Published in:
- Computers, Materials & Continua, 2023, v. 76, n. 3, p. 2597, doi. 10.32604/cmc.2023.040596
- By:
- Publication type:
- Article
MFAFNet: A Lightweight and Efficient Network with Multi-Level Feature Adaptive Fusion for Real-Time Semantic Segmentation.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 14, p. 6382, doi. 10.3390/s23146382
- By:
- Publication type:
- Article
A Secure and Efficient Multi-Object Grasping Detection Approach for Robotic Arms.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/7723164
- By:
- Publication type:
- Article
A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 1279, doi. 10.32604/cmc.2023.031445
- By:
- Publication type:
- Article
GrCol-PPFL: User-Based Group Collaborative Federated Learning Privacy Protection Framework.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 1923, doi. 10.32604/cmc.2023.032758
- By:
- Publication type:
- Article
A Survey on Image Semantic Segmentation Using Deep Learning Techniques.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 1941, doi. 10.32604/cmc.2023.032757
- By:
- Publication type:
- Article
Malware Detection Based on the Feature Selection of a Correlation Information Decision Matrix.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 4, p. 961, doi. 10.3390/math11040961
- By:
- Publication type:
- Article
A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 1279, doi. 10.32604/cmc.2023.031445
- By:
- Publication type:
- Article
GrCol-PPFL: User-Based Group Collaborative Federated Learning Privacy Protection Framework.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 1923, doi. 10.32604/cmc.2023.032758
- By:
- Publication type:
- Article
A Survey on Image Semantic Segmentation Using Deep Learning Techniques.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 1941, doi. 10.32604/cmc.2023.032757
- By:
- Publication type:
- Article
TrustControl: Trusted Private Data Usage Control Based on Security Enhanced TrustZone.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 3, p. 5687, doi. 10.32604/cmc.2022.030995
- By:
- Publication type:
- Article
An ensemble framework for interpretable malicious code detection.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 12, p. 10100, doi. 10.1002/int.22310
- By:
- Publication type:
- Article
Foreground object structure transfer for unsupervised domain adaptation.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 11, p. 8968, doi. 10.1002/int.22976
- By:
- Publication type:
- Article
A Blockchain-Based Trust Model for Uploading Illegal Data Identification.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 19, p. 9657, doi. 10.3390/app12199657
- By:
- Publication type:
- Article
Cooperative Detection Method for DDoS Attacks Based on Blockchain.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 43, n. 1, p. 103, doi. 10.32604/csse.2022.025668
- By:
- Publication type:
- Article
PoEC: A Cross-Blockchain Consensus Mechanism for Governing Blockchain by Blockchain.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 1, p. 1385, doi. 10.32604/cmc.2022.026437
- By:
- Publication type:
- Article
MIFNet: A lightweightmultiscale information fusion network.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 9, p. 5617, doi. 10.1002/int.22804
- By:
- Publication type:
- Article
MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition.
- Published in:
- KSII Transactions on Internet & Information Systems, 2022, v. 16, n. 6, p. 1833, doi. 10.3837/tiis.2022.06.004
- By:
- Publication type:
- Article
Robust zero-watermarking algorithm for medical images based on SIFT and Bandelet-DCT.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 12, p. 16863, doi. 10.1007/s11042-022-12592-x
- By:
- Publication type:
- Article
ROS-Ethereum: A Convenient Tool to Bridge ROS and Blockchain (Ethereum).
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7206494
- By:
- Publication type:
- Article
Mixed Attention Densely Residual Network for Single Image Super-Resolution.
- Published in:
- Computer Systems Science & Engineering, 2021, v. 39, n. 1, p. 133, doi. 10.32604/csse.2021.016633
- By:
- Publication type:
- Article
A survey of security threats and defense on Blockchain.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 30623, doi. 10.1007/s11042-020-09368-6
- By:
- Publication type:
- Article
DDoS Attack Detection via Multi-Scale Convolutional Neural Network.
- Published in:
- Computers, Materials & Continua, 2021, v. 68, n. 2, p. 1317, doi. 10.32604/cmc.2020.06177
- By:
- Publication type:
- Article
Improving Heterogeneous Network Knowledge Transfer Based on the Principle of Generative Adversarial.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 13, p. 1525, doi. 10.3390/electronics10131525
- By:
- Publication type:
- Article
A review of Chinese named entity recognition.
- Published in:
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 6, p. 2012, doi. 10.3837/tiis.2021.06.004
- By:
- Publication type:
- Article
Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 3, p. 2247, doi. 10.32604/cmc.2020.011668
- By:
- Publication type:
- Article
Generative Adversarial Networks: A Literature Review.
- Published in:
- KSII Transactions on Internet & Information Systems, 2020, v. 14, n. 12, p. 4625, doi. 10.3837/tiis.2020.12.001
- By:
- Publication type:
- Article
A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 1, p. 723, doi. 10.32604/cmc.2020.011272
- By:
- Publication type:
- Article
COVID-19 Public Opinion and Emotion Monitoring System Based on Time Series Thermal New Word Mining.
- Published in:
- Computers, Materials & Continua, 2020, v. 64, n. 3, p. 1415, doi. 10.32604/cmc.2020.011316
- By:
- Publication type:
- Article
Microcluster-Based Incremental Ensemble Learning for Noisy, Nonstationary Data Streams.
- Published in:
- Complexity, 2020, p. 1, doi. 10.1155/2020/6147378
- By:
- Publication type:
- Article
A DDoS Attack Information Fusion Method Based on CNN for Multi-Element Data.
- Published in:
- Computers, Materials & Continua, 2020, v. 63, n. 1, p. 131, doi. 10.32604/cmc.2020.06175
- By:
- Publication type:
- Article
DDoS Attack Detection via Multi-Scale Convolutional Neural Network.
- Published in:
- Computers, Materials & Continua, 2020, v. 62, n. 3, p. 1317, doi. 10.32604/cmc.2020.06177
- By:
- Publication type:
- Article
A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning.
- Published in:
- Computers, Materials & Continua, 2020, v. 62, n. 3, p. 1423, doi. 10.32604/cmc.2020.06176
- By:
- Publication type:
- Article
Novel DDoS Feature Representation Model Combining Deep Belief Network and Canonical Correlation Analysis.
- Published in:
- Computers, Materials & Continua, 2019, v. 61, n. 2, p. 657, doi. 10.32604/cmc.2019.06207
- By:
- Publication type:
- Article
A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map.
- Published in:
- Computers, Materials & Continua, 2019, v. 61, n. 2, p. 889, doi. 10.32604/cmc.2019.06034
- By:
- Publication type:
- Article
A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain.
- Published in:
- Computers, Materials & Continua, 2019, v. 61, n. 1, p. 363, doi. 10.32604/cmc.2019.06037
- By:
- Publication type:
- Article
A DDoS Attack Situation Assessment Method via Optimized Cloud Model Based on Influence Function.
- Published in:
- Computers, Materials & Continua, 2019, v. 60, n. 3, p. 1263, doi. 10.32604/cmc.2019.06173
- By:
- Publication type:
- Article
Corrigendum to “Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing”.
- Published in:
- 2019
- By:
- Publication type:
- Correction Notice
Contourlet-DCT based multiple robust watermarkings for medical images.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 7, p. 8463, doi. 10.1007/s11042-018-6877-5
- By:
- Publication type:
- Article
Forecasting Model Based on Information-Granulated GA-SVR and ARIMA for Producer Price Index.
- Published in:
- Computers, Materials & Continua, 2019, v. 58, n. 2, p. 463, doi. 10.32604/cmc.2019.03816
- By:
- Publication type:
- Article
A Co-Verification Interface Design for High-Assurance CPS.
- Published in:
- Computers, Materials & Continua, 2019, v. 58, n. 1, p. 287, doi. 10.32604/cmc.2019.03736
- By:
- Publication type:
- Article
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 1, p. 78, doi. 10.3390/sym11010078
- By:
- Publication type:
- Article
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6459326
- By:
- Publication type:
- Article
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5198685
- By:
- Publication type:
- Article
An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment.
- Published in:
- Computers, Materials & Continua, 2018, v. 55, n. 1, p. 95, doi. 10.3970/cmc.2018.055.095
- By:
- Publication type:
- Article