Abstract: Recently Distributed Denial of Service (DDoS) attacks have increased extensively, taking about 35% of all cyber threats among which the attack characteristic rises around 300% within the ...
Abstract: Face recognition remains challenging, especially with small and imbalanced datasets that reduce feature discriminability and limit generalization. This study investigates Light Convolutional ...
Abstract: In the recent years, cyberbullying has marked its existence and severe consequences especially among the adolescents of age between 12–20 years. Posts promoting cyberbullying spread promptly ...
Abstract: Human activity recognition (HAR) focuses on identifying and classifying human activities based on data collected from various sources. Its importance lies in its wide range of applications, ...
Abstract: The deep learning-based synthetic aperture radar (SAR) image classification model is vulnerable to adversarial attacks. Although automated deep learning (ADL) including neural architecture ...
Abstract: Deepfake technology, using deep learning, creates highly realistic yet artificial media, creating challenges for security and privacy. Convolutional Neural Networks (CNNs) play a crucial ...
A Novel Approach for Facial Emotion Recognition: Deep CNN Feature Extraction Combined with ML Models
Abstract: Facial expression recognition (FER) serves as a fundamental component of human-computer interaction, showing its influence on computing, and behavioral analysis. The proposed work here ...
Abstract: Prompt diagnosis of plant disease at an early stage is crucial for sustainable agriculture and food security. Deep learning approaches, more specifically convolutional neural networks (CNNs) ...
Abstract: Reliable fault diagnosis in power transformers is paramount for ensuring grid stability and safeguarding critical assets. This paper proposes a novel deep learning-based diagnostic framework ...
Abstract: Breast ultrasound imaging (BUS) plays a major role in the diagnosis of breast cancer. Consequently, computerised analysis of BUS images is being intensively investigated as a means to assist ...
Abstract: Cybersecurity risks have evolved in the linked digital terrain of today into more complex, frequent, and varied forms. Conventional intrusion detection systems sometimes find it difficult to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results