Found: 8
Select item for more details and to access through your institution.
Towards improved fundus disease detection using Swin Transformers.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 32, p. 78125, doi. 10.1007/s11042-024-18627-9
- By:
- Publication type:
- Article
Real-Time Transmission Control Protocol-Synchronize-Based Distributed Denial of Service Detection Framework Using Entropy Variations in Self-Coded Bot-Network Architecture.
- Published in:
- Electrica, 2023, v. 23, n. 2, p. 160, doi. 10.5152/electrica.2022.21188
- By:
- Publication type:
- Article
Performance evaluation of machine learning models for distributed denial of service attack detection using improved feature selection and hyper‐parameter optimization techniques.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 26, p. 1, doi. 10.1002/cpe.7299
- By:
- Publication type:
- Article
Detection and localization of image tampering in digital images with fused features.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 23, p. 1, doi. 10.1002/cpe.7191
- By:
- Publication type:
- Article
Computationally efficient recognition of unconstrained handwritten Urdu script using BERT with vision transformers.
- Published in:
- Neural Computing & Applications, 2023, v. 35, n. 34, p. 24161, doi. 10.1007/s00521-023-08976-1
- By:
- Publication type:
- Article
Histo-fusion: a novel domain specific learning to identify invasive ductal carcinoma (IDC) from histopathological images.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 25, p. 39371, doi. 10.1007/s11042-023-15134-1
- By:
- Publication type:
- Article
A novel image tamper detection approach by blending forensic tools and optimized CNN: Sealion customized firefly algorithm.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 2, p. 2577, doi. 10.1007/s11042-021-11529-0
- By:
- Publication type:
- Article
Time‐based DDoS attack detection through hybrid LSTM‐CNN model architectures: An investigation of many‐to‐one and many‐to‐many approaches.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 9, p. 1, doi. 10.1002/cpe.7996
- By:
- Publication type:
- Article