Results 61 to 70 of about 414,553 (176)
Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi +2 more
wiley +1 more source
Idempotent I/O for safe time travel
Debuggers for logic programming languages have traditionally had a capability most other debuggers did not: the ability to jump back to a previous state of the program, effectively travelling back in time in the history of the computation. This ``retry''
Somogyi, Zoltan
core +1 more source
This paper addresses the critical need for secure diploma generation and verification in higher education by proposing and detailing the practical implementation of DIAR, a blockchain‐based framework. DIAR leverages blockchain's inherent security features and non‐fungible tokens for efficient, cost‐effective and tamper‐proof credential management ...
Avni Rustemi, Fisnik Dalipi
wiley +1 more source
Task‐Specific Optimal Trajectory Planning of Dual‐arm Space Robot Based on Convex Optimization
This paper presents a robust, task‐specific optimal trajectory planning framework for dual‐arm space robots. The method unifies two key problems—point‐to‐point grasping and continuous trajectory tracking—within an efficient optimization framework. Extensive comparative simulations on a highly redundant 14‐degree‐of‐freedom (14‐DoF) dual‐arm space robot
Run Li, Fan Wu, Ang Li, Ming Liu
wiley +1 more source
Heating, ventilation and air conditioning (HVAC) chilled water systems have great energy‐saving potential, and while reinforcement learning (RL) is widely studied for optimizing their energy consumption, RL's low sample efficiency and dependence on randomized exploration restrict its practical use. To address this, a RL optimization approach based on a
Shihang Gao +5 more
wiley +1 more source
This study employs industrial cameras to capture video streams and utilises a deep learning‐based approach to locate and track packing boxes on the production line, mapping them into a digital twin space. This addresses the issue of discontinuous target information acquisition inherent in photoelectric sensors and enhances simulation accuracy ...
Jiashun Li +3 more
wiley +1 more source
This paper investigates how circuit representation, flat SPICE Netlists versus structured PySpice code, influences LLM performance in functional block recognition tasks. Using a benchmark of six analogue comparator circuits derived from a standard educational collection. Our results reveal that most models showed decreased performance on the structured
Andrei Dăescu +3 more
wiley +1 more source
This paper proposes a non‐contact method for measuring the turn‐off time of insulated‐gate bipolar transistor (IGBT) devices in modular multilevel converters (MMC) submodules, using the decay of load‐side common‐mode current. The technique leverages existing current‐sensing infrastructure and avoids intrusive modifications, enabling real‐time ...
Jiyun Liu +7 more
wiley +1 more source
Forensic analysis and evaluation of file‐wiping applications in Android OS
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh +6 more
wiley +1 more source
Beyond verbal self‐explanations: Student annotations of a code‐tracing solution produced by ChatGPT
Abstract ChatGPT is a generative Artificial Intelligence (AI) that can produce a variety of outputs, including solutions to problems. Prior research shows that for students to learn from instructional content, they need to actively process the content.
Abbey Gandhi, Kasia Muldner
wiley +1 more source

