Results 51 to 60 of about 37,859 (190)

Temporal Segment Connection Network for Action Recognition

open access: yesIEEE Access, 2020
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li   +4 more
doaj   +1 more source

A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks

open access: yesIEEE Access, 2017
The rapid growth in the volume and importance of web communication throughout the Internet has heightened the need for better security protection. Security experts, when protecting systems, maintain a database featuring signatures of a large number of ...
Muhammad Hilmi Kamarudin   +3 more
doaj   +1 more source

A Robust Stackelberg Game for Cyber-Security Investment in Networked Control Systems [PDF]

open access: green, 2021
Pratishtha Shukla   +3 more
openalex   +1 more source

Detecting and Exploring Homogeneous Dense Groups via k-Core Decomposition and Core Member Filtering in Social Networks

open access: yesApplied Sciences
Exploring homogeneous dense groups is one of the important issues in social network structure measurement. k-core decomposition and core member filtering are common methods to uncover homogeneous dense groups in a network.
Zeyu Zhang   +7 more
doaj   +1 more source

An interactive segmentation-based method for seismic facies annotation and segmentation

open access: yesScientific Reports
Seismic facies segmentation plays a critical role in seismic interpretation and geological analysis, providing essential support for subsurface stratigraphic characterization and hydrocarbon reservoir identification.
Siyuan Tian   +5 more
doaj   +1 more source

An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway [PDF]

open access: gold, 2022
Sule Yildirim Yayilgan   +4 more
openalex   +1 more source

Deep Recurrent Model for Server Load and Performance Prediction in Data Center

open access: yesComplexity, 2017
Recurrent neural network (RNN) has been widely applied to many sequential tagging tasks such as natural language process (NLP) and time series analysis, and it has been proved that RNN works well in those areas.
Zheng Huang   +4 more
doaj   +1 more source

CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain

open access: yesInformation
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges.
Jiahui Jiang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy