Results 131 to 140 of about 240,849 (326)

An enhanced ensemble defense framework for boosting adversarial robustness of intrusion detection systems

open access: yesScientific Reports
Machine learning (ML) and deep neural networks (DNN) have emerged as powerful tools for enhancing intrusion detection systems (IDS) in cybersecurity.
Zeinab Awad, Magdy Zakaria, Rasha Hassan
doaj   +1 more source

Retinal Vessel Segmentation: A Comprehensive Review From Classical Methods to Deep Learning Advances (1982–2025)

open access: yesAdvanced Intelligent Systems, EarlyView.
Four decades of retinal vessel segmentation research (1982–2025) are synthesized, spanning classical image processing, machine learning, and deep learning paradigms. A meta‐analysis of 428 studies establishes a unified taxonomy and highlights performance trends, generalization capabilities, and clinical relevance.
Avinash Bansal   +6 more
wiley   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

SCP‐Pose: Leveraging Structural Consistency Prior Knowledge for Real‐Time Category‐Level 6D Pose Estimation

open access: yesAdvanced Intelligent Systems, EarlyView.
This paper presents a high‐speed object pose estimation method that deconstructs objects into geometric components. Inspired by human cognitive generalization, it detects these primitives and infers the 6D pose from their stable spatial configuration.
Xuyang Li   +6 more
wiley   +1 more source

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems [PDF]

open access: green, 2019
Tianyu Du   +5 more
openalex   +1 more source

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

Xstainer: A Novel Virtual Staining Tool Powered by Advanced Deep Learning Techniques

open access: yesAdvanced Intelligent Systems, EarlyView.
Xstainer is a deep learning–based virtual staining framework that converts hematoxylin and eosin‐stained whole slide images into multiple histochemical stains, including Masson's trichrome, Periodic acid‐Schiff, Jones methenamine silver, and Toluidine blue.
Fatma Nur Kinali   +15 more
wiley   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy