Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,249)
  • Open Access

    ARTICLE

    Global and Graph Encoded Local Discriminative Region Representation for Scene Recognition

    Chaowei Lin1,#, Feifei Lee1,#,*, Jiawei Cai1, Hanqing Chen1, Qiu Chen2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.3, pp. 985-1006, 2021, DOI:10.32604/cmes.2021.014522

    Abstract Scene recognition is a fundamental task in computer vision, which generally includes three vital stages, namely feature extraction, feature transformation and classification. Early research mainly focuses on feature extraction, but with the rise of Convolutional Neural Networks (CNNs), more and more feature transformation methods are proposed based on CNN features. In this work, a novel feature transformation algorithm called Graph Encoded Local Discriminative Region Representation (GEDRR) is proposed to find discriminative local representations for scene images and explore the relationship between the discriminative regions. In addition, we propose a method using the multi-head attention module to enhance and fuse convolutional… More >

  • Open Access

    ABSTRACT

    Abstract: IV Joint Meeting of The Biology Societies of Argentina

    BIOCELL, Vol.45, Suppl.3, pp. 1-117, 2021

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Hybrid Algorithm Based on PSO and GA for Feature Selection

    Yu Xue1,*, Asma Aouari1, Romany F. Mansour2, Shoubao Su3

    Journal of Cyber Security, Vol.3, No.2, pp. 117-124, 2021, DOI:10.32604/jcs.2021.017018

    Abstract One of the main problems of machine learning and data mining is to develop a basic model with a few features, to reduce the algorithms involved in classification’s computational complexity. In this paper, the collection of features has an essential importance in the classification process to be able minimize computational time, which decreases data size and increases the precision and effectiveness of specific machine learning activities. Due to its superiority to conventional optimization methods, several metaheuristics have been used to resolve FS issues. This is why hybrid metaheuristics help increase the search and convergence rate of the critical algorithms. A… More >

  • Open Access

    ARTICLE

    Blockchain Based Secure Solution for Cloud Storage: A Model for Synchronizing Industry 4.0 and IIoT

    Prakhar Sahu1,*, S. K. Singh1, Arun Kumar Singh2

    Journal of Cyber Security, Vol.3, No.2, pp. 107-115, 2021, DOI:10.32604/jcs.2021.020831

    Abstract Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly. In the fourth phase of industrial revolution, manufacturers are dependent upon data produced by the consumers to invent, innovate or change anything for the product. Internet of things devices like OBD, RFID, IIoT, Smart devices are the major source of data generation and represents trends in the industry. Since the IoT device are vulnerable to hackers due to its limitation, consumer data security should be tighten up and enhanced. This paper gives an… More >

  • Open Access

    ARTICLE

    Computational Intelligent Techniques To Detect DDOS Attacks : A Survey

    Isha Sood*, Varsha Sharma

    Journal of Cyber Security, Vol.3, No.2, pp. 89-106, 2021, DOI:10.32604/jcs.2021.018623

    Abstract The Internet is often targeted by the Distributed Denial of Service (DDOS) Attacks that deliberately utilize resources and bandwidth to prohibit access to potential users. The attack possibility is that the packets are filled massively. A DOS attack is launched by a single source, while a DDOS attack is originated from numerous resources. DDoS attacks are not capable of stealing website user’s information. The prime motive of the DDoS attacks is to devastate the website resources. Distributed Denial of Service (DDoS) attacks are disruptive to internet access on the Network. The attitude of the customer to get fast and reliable… More >

  • Open Access

    ARTICLE

    Pedestrian Crossing Detection Based on HOG and SVM

    Yunzuo Zhang*, Kaina Guo, Wei Guo, Jiayu Zhang, Yi Li

    Journal of Cyber Security, Vol.3, No.2, pp. 79-88, 2021, DOI:10.32604/jcs.2021.017082

    Abstract In recent years, pedestrian detection is a hot research topic in the field of computer vision and artificial intelligence, it is widely used in the field of security and pedestrian analysis. However, due to a large amount of calculation in the traditional pedestrian detection technology, the speed of many systems for pedestrian recognition is very limited. But in some restricted areas, such as construction hazardous areas, real-time detection of pedestrians and cross-border behaviors is required. To more conveniently and efficiently detect whether there are pedestrians in the restricted area and cross-border behavior, this paper proposes a pedestrian cross-border detection method… More >

  • Open Access

    ARTICLE

    Multi-UAV Cooperative GPS Spoofing Based on YOLO Nano

    Yongjie Ding1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.3, No.2, pp. 69-78, 2021, DOI:10.32604/jcs.2021.019105

    Abstract In recent years, with the rapid development of the drone industry, drones have been widely used in many fields such as aerial photography, plant protection, performance, and monitoring. To effectively control the unauthorized flight of drones, using GPS spoofing attacks to interfere with the flight of drones is a relatively simple and highly feasible attack method. However, the current method uses ground equipment to carry out spoofing attacks. The attack range is limited and the flexibility is not high. Based on the existing methods, this paper proposes a multi-UAV coordinated GPS spoofing scheme based on YOLO Nano, which can launch… More >

  • Open Access

    ARTICLE

    Provenance Method of Electronic Archives Based on Knowledge Graph in Big Data Environment

    Chun Xu1, Jiang Xu1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 91-99, 2021, DOI:10.32604/jihpp.2021.019883

    Abstract With the advent of the era of big data, the Provenance Method of electronic archives based on knowledge graph under the environment of big data has produced a large number of electronic archives due to the development of science and technology. How to guarantee the credential characteristics of electronic archives in the big data environment has attracted wide attention of the academic community. Provenance is an important technical means to guarantee the certification of electronic archives. In this paper, knowledge graph technology is used to provide the concept provenance of electronic archives in large data environment. It not only enriches… More >

  • Open Access

    ARTICLE

    Adaptive Multi-Scale HyperNet with Bi-Direction Residual Attention Module for Scene Text Detection

    Junjie Qu, Jin Liu*, Chao Yu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 83-89, 2021, DOI:10.32604/jihpp.2021.017181

    Abstract Scene text detection is an important step in the scene text reading system. There are still two problems during the existing text detection methods: (1) The small receptive of the convolutional layer in text detection is not sufficiently sensitive to the target area in the image; (2) The deep receptive of the convolutional layer in text detection lose a lot of spatial feature information. Therefore, detecting scene text remains a challenging issue. In this work, we design an effective text detector named Adaptive Multi-Scale HyperNet (AMSHN) to improve texts detection performance. Specifically, AMSHN enhances the sensitivity of target semantics in… More >

  • Open Access

    ARTICLE

    A Reversible Data Hiding Algorithm Based on Secret Sharing

    Xin Jin*, Lanxin Su, Jitao Huang

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 69-82, 2021, DOI:10.32604/jihpp.2021.014108

    Abstract In traditional secret sharing schemes, all shared images containing secret segments are needed to recover secret information. In this paper, a reversible data hiding scheme based on Shamir secret sharing is used. Secret information can be recovered even if only part of the encrypted sharing is owned. This method can reduce the vulnerability of traditional encryption sharing schemes to attack. Before uploading the secret information to the cloud server, embed the encrypted n segments of secret information into n different pictures. The receiver downloads t images from the cloud server (t < n), extracts the encrypted information using the watermark… More >

Displaying 11361-11370 on page 1137 of 22249. Per Page