Results 41 to 50 of about 37,859 (190)

TAN: a temporal-aware attention network with context-rich representation for boosting proposal generation

open access: yesComplex & Intelligent Systems
Temporal action proposal generation in an untrimmed video is very challenging, and comprehensive context exploration is critically important to generate accurate candidates of action instances. This paper proposes a Temporal-aware Attention Network (TAN)
Yanyan Jiao   +4 more
doaj   +1 more source

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

A Data Enhancement Algorithm for DDoS Attacks Using IoT

open access: yesSensors, 2023
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv   +4 more
doaj   +1 more source

MAP-GAN: multi-attribute facial privacy protection model without losing identification

open access: yesCybersecurity
In recent years, the proliferation of facial image collection systems coupled with significant advancements in machine learning-driven image analysis techniques has posed formidable challenges to protecting individuals’ privacy information, raising ...
Yue Wang   +5 more
doaj   +1 more source

Log Analyzer To Detect Malicious Attacks Based On Pattern Matching [PDF]

open access: yesITM Web of Conferences
The Log Analyzer scan through the system logs and search for patterns found in particular cyber threat and come to conclusion whether a system is infiltrated and data is being breached, given if the patterns of cyber threat match with the system logs and
Murthy N. N. A. G. Sadasiva   +3 more
doaj   +1 more source

Fast Payments Across Heterogeneous Blockchains for Internet of Things

open access: yesIEEE Access
Internet of Things data exchange services facilitate the connection and flexible exchange of data among distributed IoT data sources. Traditional IoT data exchange services typically involve direct data uploads to the cloud, allowing service providers to
Zhikai Lin   +3 more
doaj   +1 more source

Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer

open access: yesCybersecurity
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently.
Yamei Wang   +4 more
doaj   +1 more source

RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62

open access: yesCryptography
The journal retracts the article, “A Publicly Verifiable E-Voting System Based on Biometrics” [...]
Jinhui Liu   +5 more
doaj   +1 more source

Synchronisation, Optimisation and Adaptation of Machine Learning Techniques for Computer Vision in Cyber‐Physical Systems: A Comprehensive Analysis

open access: yesIET Cyber-Physical Systems
Cyber‐physical systems (CPS) seamlessly integrate computers, networks and physical devices, enabling machines to communicate, process data and respond to real‐world conditions in real time.
Kai Hung Tang   +4 more
doaj   +1 more source

Detection of Electric Network Frequency in Audio Using Multi-HCNet

open access: yesSensors
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy