Results 21 to 30 of about 3,479,617 (281)
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H., +7 more
doaj
Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan +4 more
doaj +1 more source
Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin +4 more
doaj +1 more source
N-Trans: Parallel Detection Algorithm for DGA Domain Names
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang +4 more
doaj +1 more source
Mathematical approximator based on basic spline approximation [PDF]
The article considers the problem of constructing a mathematical piecewise linear approximator based on approximation by basis splines. An algorithm has been developed designed to implement a class of special functions and create parallel ...
Turdimatov Mamirjon +5 more
doaj +1 more source
Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li +4 more
doaj +1 more source
A Data Enhancement Algorithm for DDoS Attacks Using IoT
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv +4 more
doaj +1 more source
Published incidents and their proportions of human error [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security ...
Evans, M. +3 more
core +1 more source
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman +8 more
wiley +1 more source
Cryptanalysis on Two Kinds of Number Theoretic Pseudo-Random Generators Using Coppersmith Method
Pseudo-random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera.
Ran Zhang +3 more
doaj +1 more source

