A hybrid machine learning approach for detecting DDoS attacks in software-defined networks. [PDF]
Mahar IA +5 more
europepmc +1 more source
Context Awareness and Human–Robot Interaction Optimization for Museum Intelligent Guide Robot
This study presents a context‐aware human–robot interaction framework designed for intelligent museum guide robots. The system features a three‐layer architecture—perception, understanding, and behavior execution—that enables adaptive and meaningful interactions with museum visitors.
Anna Zou, Yue Meng, Shijing Tong
wiley +1 more source
Anomaly-based intrusion detection on benchmark datasets for network security: a comprehensive evaluation. [PDF]
Kumar LKS +7 more
europepmc +1 more source
Musculoskeletal humanoids exhibit rich biomechanical properties that remain insufficiently unified in prior discussions. This article systematically categorizes muscle characteristics into five properties: redundancy, independency, anisotropy, variable moment arm, and nonlinear elasticity, and analyzes their combined effects on control.
Kento Kawaharazuka +2 more
wiley +1 more source
A federated deep learning approach for SDN security with quantum optimized feature selection and hybrid MSDC net architecture. [PDF]
Rohith S +3 more
europepmc +1 more source
Feature from recent image foundation models (DINOv2) are useful for vision tasks (segmentation, object localization) with little or no human input. Once upsampled, they can be used for weakly supervised micrograph segmentation, achieving strong results when compared to classical features (blurs, edge detection) across a range of material systems.
Ronan Docherty +2 more
wiley +1 more source
Identification and detection of DDoS attack on smart home infrastructure using machine learning models. [PDF]
Raja TV +4 more
europepmc +1 more source
Network traffic classification using Apache Spark
Apache Spark’s capabilites offer new possibilities to make software systems more scalable and reliable. The framework can be used to improve old network visibility platforms. Previously, these systems used to be run in a single node, and used Deep Packet Inspection (DPI) techniques to classify the network flows.
openaire +1 more source
Human‐Machine Mutual Trust Based Shared Control Framework for Intelligent Vehicles
This work introduces a bidirectional‐trust‐driven shared control framework for human‐machine co‐driving. The method models human‐to‐machine trust from intention discrepancies and Bayesian skill assessment, and machine‐to‐human trust from integrated ability evaluation.
Zhishuai Yin +4 more
wiley +1 more source
Smart IoT applications of multi attack detection using cluster F1MI approach. [PDF]
Nagavel V, Bhuvaneswari PTV, Ramesh P.
europepmc +1 more source

