期刊文献+
共找到10,847篇文章
< 1 2 250 >
每页显示 20 50 100
Fraud detections for online businesses:a perspective from blockchain technology 被引量:2
1
作者 Yuanfeng Cai Dan Zhu 《Financial Innovation》 2016年第1期256-265,共10页
Background:The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers.However,it is vulnerable to rating fraud.Some raters may inject unfairly high ... Background:The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers.However,it is vulnerable to rating fraud.Some raters may inject unfairly high or low ratings to the system so as to promote their own products or demote their competitors.Method:This study explores the rating fraud by differentiating the subjective fraud from objective fraud.Then it discusses the effectiveness of blockchain technology in objective fraud and its limitation in subjective fraud,especially the rating fraud.Lastly,it systematically analyzes the robustness of blockchain-based reputation systems in each type of rating fraud.Results:The detection of fraudulent raters is not easy since they can behave strategically to camouflage themselves.We explore the potential strengths and limitations of blockchain-based reputation systems under two attack goals:ballot-stuffing and bad-mouthing,and various attack models including constant attack,camouflage attack,whitewashing attack and sybil attack.Blockchain-based reputation systems are more robust against bad-mouthing than ballot-stuffing fraud.Conclusions:Blockchain technology provides new opportunities for redesigning the reputation system.Blockchain systems are very effective in preventing objective information fraud,such as loan application fraud,where fraudulent information is fact-based.However,their effectiveness is limited in subjective information fraud,such as rating fraud,where the ground-truth is not easily validated.Blockchain systems are effective in preventing bad mouthing and whitewashing attack,but they are limited in detecting ballot-stuffing under sybil attack,constant attacks and camouflage attack. 展开更多
关键词 Blockchain Fraud detection Rating fraud Reputation systems
在线阅读 下载PDF
A New Method for the Detections of Multiple Faults Using Binary Decision Diagrams 被引量:1
2
作者 PAN Zhongliang CHEN Ling ZHANG Guangzhao 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1943-1946,共4页
With the complexity of integrated circuits is continually increasing, a local defect in circuits may cause multiple faults. The behavior of a digital circuit with a multiple fault may significantly differ from that of... With the complexity of integrated circuits is continually increasing, a local defect in circuits may cause multiple faults. The behavior of a digital circuit with a multiple fault may significantly differ from that of a single fault. A new method for the detection of multiple faults in digital circuits is presented in this paper, the method is based on binary decision diagram (BDD). First of all, the BDDs for the normal circuit and faulty circuit are built respectively. Secondly, a test BDD is obtained by the XOR operation of the BDDs corresponds to normal circuit and faulty circuit. In the test BDD, each input assignment that leads to the leaf node labeled 1 is a test vector of multiple faults. Therefore, the test set of multiple faults is generated by searching for the type of input assignments in the test BDD. Experimental results on some digital circuits show the feasibility of the approach presented in this paper. 展开更多
关键词 digital circuits multiple faults fault detection binary decision diagrams
在线阅读 下载PDF
Microstrip Patch Antenna with an Inverted T-Type Notch in the Partial Ground for Breast Cancer Detections
3
作者 Nure Alam Chowdhury Lulu Wang +2 位作者 Md Shazzadul Islam Linxia Gu Mehmet Kaya 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1301-1322,共22页
This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human breast.The size of the current antenna is small enough(18mm×21mm×1.6mm)... This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human breast.The size of the current antenna is small enough(18mm×21mm×1.6mm)todistribute around the breast phantom.The operating frequency has been observed from6–14GHzwith a minimumreturn loss of−61.18 dB and themaximumgain of current proposed antenna is 5.8 dBiwhich is flexiblewith respectto the size of antenna.After the distribution of eight antennas around the breast phantom,the return loss curveswere observed in the presence and absence of tumor cells inside the breast phantom,and these observations showa sharp difference between the presence and absence of tumor cells.The simulated results show that this proposedantenna is suitable for early detection of cancerous cells inside the breast. 展开更多
关键词 Antenna microwave wideband cancer breast phantom tumor detection
暂未订购
3D SERS substrate based on nanocone forests for miRNA detections
4
作者 LI Ruirui LI Yongwei XIONG Jijun 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2021年第2期226-231,共6页
Surface-enhanced Raman scattering(SERS)is a powerful technology for obtaining vibrational information from molecules that present in different chemical or biological environments.This paper presents a 3D SERS substrat... Surface-enhanced Raman scattering(SERS)is a powerful technology for obtaining vibrational information from molecules that present in different chemical or biological environments.This paper presents a 3D SERS substrate based on nanocone forests.The substrates are prepared by using plasma treatment technique,which is a simple,fast and high-throughput approach.The SERS substrate based on nanocone forests exhibits high sensitivity.In the experiment,miRNA with a concentration as low as 10-10 M can be achieved.Meanwhile,the proposed SERS substrate shows a high uniformity over a large area.These experimental results demonstrate great potential of the 3D SERS substrate in wide applications. 展开更多
关键词 surface-enhanced Raman scattering(SERS)substrates nanocone forests three-dimensional hot spots miRNA detection
在线阅读 下载PDF
Low-complexity and fast convergent multiuser detections for impulse UWB systems
5
作者 郑霖 Qiu Hongbing 《High Technology Letters》 EI CAS 2008年第2期141-146,共6页
To solve the problem that the conventional detections in DS-CDMA suffer from high complexity and poor robustness for the time-hopping pulse signals, the received pulse signals were remodeled, and a mulfipath-free dete... To solve the problem that the conventional detections in DS-CDMA suffer from high complexity and poor robustness for the time-hopping pulse signals, the received pulse signals were remodeled, and a mulfipath-free detection scheme, which provides a simple approach to select samples of received signals, was introduced. By this scheme, the subsequent multiuser detection (MUD) would get rid of the mis- match due to the correlative multipath signal in IR-UWB. In addition, a computationally efficient recur-sive least squares (RLS) type algorithm based on least mean fourth (LMF) criterion is derived to suppress multi-access interference. The proposed multiuser detection algorithm performs well at low complexity, even in dense muhipath environment. 展开更多
关键词 ULTRA-WIDEBAND multiuser detection (MUD) multipath interference (MPI) leastmean fourth (LMF)
在线阅读 下载PDF
Unconventional application of a fluorescent probe for MS-based detection of multiple sulfur species in ferroptosis
6
作者 Mengyu Cao Yiyan Yin +2 位作者 Jingyi Qin Jin Ouyang Na Na 《Chinese Chemical Letters》 2026年第1期552-556,共5页
Ferroptosis has exhibited great potential in therapies and intracellular reducing agents of sulfur species(RSSs) in the thiol-dependent redox systems are crucial in ferroptosis.This makes the simultaneous detection of... Ferroptosis has exhibited great potential in therapies and intracellular reducing agents of sulfur species(RSSs) in the thiol-dependent redox systems are crucial in ferroptosis.This makes the simultaneous detection of multiple RSSs significant for evaluating ferroptosis therapy.However,the traditional techniques,including fluorescent(FL) imaging and electrospray ionization-based mass spectrometry(MS) detection,cannot achieve the discrimination of different RSSs.Herein,simultaneous MS detection of multiple RSSs,including cysteine(Cys),homocysteine(Hcy),glutathione(GSH) and hydrogen sulfide(H_(2)S),was obtained upon enhancing ionization efficiency by a fluorescent probe(NBD-O-1).Based on the interaction between NBD-O-1 and RSSs,the complex of RSSs with a fragment of NBD-O-1 can be generated,which can be easily ionized for MS detection in the negative mode.Therefore,the intracellular RSSs can be well detected upon the incubation of He La cells with the probe of NBD-O-1,exhibiting the total RSS levels by the FL imaging and further providing expression of each RSS by enhanced MS detection.Furthermore,the RSSs during ferroptosis in He La cells have been evaluated using the present strategy,demonstrating the potential for ferroptosis examinations.This work has made an unconventional application of a fluorescent probe to enhance the detection of multiple RSSs by MS,providing significant molecular information for addressing the ferroptosis mechanism. 展开更多
关键词 Reducing sulfur species Ferroptosis Fluorescent probe Enhanced-ESI MS Intracellular detections
原文传递
中国丹顶鹤迁徙路线湿地景观格局演化模式及其驱动因素
7
作者 尹梓烨 那晓东 《生态学报》 北大核心 2026年第4期1800-1814,共15页
探究丹顶鹤迁徙路线上的湿地景观格局演化模式及驱动因素,有利于构建促进物种迁徙的生态廊道、科学制定湿地修复策略、维护湿地生态系统稳定。以丹顶鹤迁徙路线上的湿地为对象,获取1990—2020年共七期土地利用/覆被数据,基于改进过后的... 探究丹顶鹤迁徙路线上的湿地景观格局演化模式及驱动因素,有利于构建促进物种迁徙的生态廊道、科学制定湿地修复策略、维护湿地生态系统稳定。以丹顶鹤迁徙路线上的湿地为对象,获取1990—2020年共七期土地利用/覆被数据,基于改进过后的景观格局状态与演化识别模型(SEDM)研究湿地格局演化模式的时空分布特征,并利用地理探测器分析其驱动因素。结果表明:(1)1990—2015年间湿地面积减少了7994km^(2),湿地萎缩严重,大量湿地转化为耕地、人工表面。2015—2020年湿地面积增加,而转入湿地的主要类型为耕地、水域和林地。(2)湿地景观格局的演化具有明显的阶段性特征,1990—2000年间湿地格局演化以破碎类型为主,收缩与减少模式占主导;2000—2015年湿地面积减少趋势放缓,发生演化的格网数量显著减少,湿地格局演化模式由减少模式向新增模式过渡;2015—2020年湿地景观格局演化以扩张类型为主,增加与新增演化模式为主导,湿地得到有效恢复。(3)湿地格局演化频数较高的区域集中在东北松嫩平原、三江平原、黄河三角洲与盐城滨海地区,气温、降水和耕地对湿地格局演化影响最为显著。其中在东北地区的松嫩和三江平原湿地格局演化频繁主要受气候变化、耕地扩张影响,而黄河三角洲和盐城湿地格局演化主要受人类活动的影响。总体来看,气候变化虽然是湿地格局演化的关键因素,但湿地格局演化从破碎转向扩张模式,主要是受人为因素的驱动。 展开更多
关键词 湿地 the state-and-evolution detection models(SEDM)模型 景观格局演化模式 地理探测器 丹顶鹤
在线阅读 下载PDF
Global-local feature optimization based RGB-IR fusion object detection on drone view 被引量:1
8
作者 Zhaodong CHEN Hongbing JI Yongquan ZHANG 《Chinese Journal of Aeronautics》 2026年第1期436-453,共18页
Visible and infrared(RGB-IR)fusion object detection plays an important role in security,disaster relief,etc.In recent years,deep-learning-based RGB-IR fusion detection methods have been developing rapidly,but still st... Visible and infrared(RGB-IR)fusion object detection plays an important role in security,disaster relief,etc.In recent years,deep-learning-based RGB-IR fusion detection methods have been developing rapidly,but still struggle to deal with the complex and changing scenarios captured by drones,mainly due to two reasons:(A)RGB-IR fusion detectors are susceptible to inferior inputs that degrade performance and stability.(B)RGB-IR fusion detectors are susceptible to redundant features that reduce accuracy and efficiency.In this paper,an innovative RGB-IR fusion detection framework based on global-local feature optimization,named GLFDet,is proposed to improve the detection performance and efficiency of drone-captured objects.The key components of GLFDet include a Global Feature Optimization(GFO)module,a Local Feature Optimization(LFO)module and a Channel Separation Fusion(CSF)module.Specifically,GFO calculates the information content of the input image from the frequency domain and optimizes the features holistically.Then,LFO dynamically selects high-value features and filters out low-value features before fusion,which significantly improves the efficiency of fusion.Finally,CSF fuses the RGB and IR features across the corresponding channels,which avoids the rearrangement of the channel relationships and enhances the model stability.Extensive experimental results show that the proposed method achieves the best performance on three popular RGB-IR datasets Drone Vehicle,VEDAI,and LLVIP.In addition,GLFDet is more lightweight than other comparable models,making it more appealing to edge devices such as drones.The code is available at https://github.com/lao chen330/GLFDet. 展开更多
关键词 Object detection Deep learning RGB-IR fusion DRONES Global feature Local feature
原文传递
基于DETR的视频时刻检索方法综述
9
作者 高杜娟 吴媛媛 +3 位作者 林文龙 谢天圻 嘉昊阳 冯昭天 《计算机工程与应用》 北大核心 2026年第5期18-38,共21页
视频时刻检索旨在根据自然语言查询精确定位视频中的特定片段,是视频理解下的重要任务之一。传统方法依赖冗余候选生成和手工特征设计,难以兼顾检索精度与计算效率。近年来,基于Detection Transformer(DETR)的端到端方法借助可学习查询... 视频时刻检索旨在根据自然语言查询精确定位视频中的特定片段,是视频理解下的重要任务之一。传统方法依赖冗余候选生成和手工特征设计,难以兼顾检索精度与计算效率。近年来,基于Detection Transformer(DETR)的端到端方法借助可学习查询机制和直接回归预测策略,简化了框架的同时提升了检索性能。对DETR在视频时刻检索中的关键技术进展进行了系统综述,回顾了DETR模型的基础原理及其在该任务中的适配改进;对DETR的模型框架结构的优化研究方法进行了分类,细分为基于输入建模的特征增强、基于跨模态对齐的交互机制优化以及基于解码器结构与时刻回归机制这三个优化方向。对主流方法进行了系统梳理与检索精度比较;结合实验结果,分析了不同优化策略对模型性能的影响,并总结了各方法在主流数据集上的表现差异。最后,针对面向真实应用场景的泛化、跨模态交互走向语义整合机制以及面向开放领域与个性化检索的扩展这三个未来发展方向进行了讨论展望,为后续研究提供理论参考与实践指导。 展开更多
关键词 视频时刻检索 Detection Transformer(DETR) 深度学习
在线阅读 下载PDF
Deep Feature-Driven Hybrid Temporal Learning and Instance-Based Classification for DDoS Detection in Industrial Control Networks
10
作者 Haohui Su Xuan Zhang +2 位作者 Lvjun Zheng Xiaojie Shen Hua Liao 《Computers, Materials & Continua》 2026年第3期708-733,共26页
Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods... Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods are ineffective against novel attacks,and traditional machine learning models struggle to capture the complex temporal dependencies and dynamic traffic patterns inherent in ICN environments.To address these challenges,this study proposes a deep feature-driven hybrid framework that integrates Transformer,BiLSTM,and KNN to achieve accurate and robust DDoS detection.The Transformer component extracts global temporal dependencies from network traffic flows,while BiLSTM captures fine-grained sequential dynamics.The learned embeddings are then classified using an instance-based KNN layer,enhancing decision boundary precision.This cascaded architecture balances feature abstraction and locality preservation,improving both generalization and robustness.The proposed approach was evaluated on a newly collected real-time ICN traffic dataset and further validated using the public CIC-IDS2017 and Edge-IIoT datasets to demonstrate generalization.Comprehensive metrics including accuracy,precision,recall,F1-score,ROC-AUC,PR-AUC,false positive rate(FPR),and detection latency were employed.Results show that the hybrid framework achieves 98.42%accuracy with an ROC-AUC of 0.992 and FPR below 1%,outperforming baseline machine learning and deep learning models.Robustness experiments under Gaussian noise perturbations confirmed stable performance with less than 2%accuracy degradation.Moreover,detection latency remained below 2.1 ms per sample,indicating suitability for real-time ICS deployment.In summary,the proposed hybrid temporal learning and instance-based classification model offers a scalable and effective solution for DDoS detection in industrial control environments.By combining global contextual modeling,sequential learning,and instance-based refinement,the framework demonstrates strong adaptability across datasets and resilience against noise,providing practical utility for safeguarding critical infrastructure. 展开更多
关键词 DDoS detection transformer BiLSTM K-Nearest Neighbor representation learning network security intrusion detection real-time classification
在线阅读 下载PDF
A Comprehensive Literature Review on YOLO-Based Small Object Detection:Methods,Challenges,and Future Trends
11
作者 Hui Yu Jun Liu Mingwei Lin 《Computers, Materials & Continua》 2026年第4期258-309,共52页
Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of... Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of object detection,there are still many issues to be resolved in detecting small objects due to the inherent complexity and diversity of real-world visual scenes.In particular,the YOLO(You Only Look Once)series of detection models,renowned for their real-time performance,have undergone numerous adaptations aimed at improving the detection of small targets.In this survey,we summarize the state-of-the-art YOLO-based small object detection methods.This review presents a systematic categorization of YOLO-based approaches for small-object detection,organized into four methodological avenues,namely attention-based feature enhancement,detection-head optimization,loss function,and multi-scale feature fusion strategies.We then examine the principal challenges addressed by each category.Finally,we analyze the performance of thesemethods on public benchmarks and,by comparing current approaches,identify limitations and outline directions for future research. 展开更多
关键词 Small object detection YOLO real-time detection feature fusion deep learning
在线阅读 下载PDF
AI-Powered Anomaly Detection and Cybersecurity in Healthcare IoT with Fog-Edge
12
作者 Fatima Al-Quayed 《Computer Modeling in Engineering & Sciences》 2026年第1期1339-1372,共34页
The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.Thi... The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats. 展开更多
关键词 AI-powered anomaly detection healthcare IoT fog computing CYBERSECURITY intrusion detection
在线阅读 下载PDF
A Comparative Benchmark of Deep Learning Architectures for AI-Assisted Breast Cancer Detection in Mammography Using the MammosighTR Dataset:A Nationwide Turkish Screening Study(2016–2022)
13
作者 Nuh Azginoglu 《Computer Modeling in Engineering & Sciences》 2026年第1期1151-1173,共23页
Breast cancer screening programs rely heavily on mammography for early detection;however,diagnostic performance is strongly affected by inter-reader variability,breast density,and the limitations of conven-tional comp... Breast cancer screening programs rely heavily on mammography for early detection;however,diagnostic performance is strongly affected by inter-reader variability,breast density,and the limitations of conven-tional computer-aided detection systems.Recent advances in deep learning have enabled more robust and scalable solutions for large-scale screening,yet a systematic comparison of modern object detection architectures on nationally representative datasets remains limited.This study presents a comprehensive quantitative comparison of prominent deep learning–based object detection architectures for Artificial Intelligence-assisted mammography analysis using the MammosighTR dataset,developed within the Turkish National Breast Cancer Screening Program.The dataset comprises 12,740 patient cases collected between 2016 and 2022,annotated with BI-RADS categories,breast density levels,and lesion localization labels.A total of 31 models were evaluated,including One-Stage,Two-Stage,and Transformer-based architectures,under a unified experimental framework at both patient and breast levels.The results demonstrate that Two-Stage architectures consistently outperform One-Stage models,achieving approximately 2%–4%higher Macro F1-Scores and more balanced precision–recall trade-offs,with Double-Head R-CNN and Dynamic R-CNN yielding the highest overall performance(Macro F1≈0.84–0.86).This advantage is primarily attributed to the region proposal mechanism and improved class balance inherent to Two-Stage designs.One-Stage detectors exhibited higher sensitivity and faster inference,reaching Recall values above 0.88,but experienced minor reductions in Precision and overall accuracy(≈1%–2%)compared with Two-Stage models.Among Transformer-based architectures,Deformable DEtection TRansformer demonstrated strong robustness and consistency across datasets,achieving Macro F1-Scores comparable to CNN-based detectors(≈0.83–0.85)while exhibiting minimal performance degradation under distributional shifts.Breast density–based analysis revealed increased misclassification rates in medium-density categories(types B and C),whereas Transformer-based architectures maintained more stable performance in high-density type D tissue.These findings quantitatively confirm that both architectural design and tissue characteristics play a decisive role in diagnostic accuracy.Overall,the study provides a reproducible benchmark and highlights the potential of hybrid approaches that combine the accuracy of Two-Stage detectors with the contextual modeling capability of Transformer architectures for clinically reliable breast cancer screening systems. 展开更多
关键词 Deep learning MAMMOGRAPHY breast cancer detection object detection BI-RADS classification
在线阅读 下载PDF
A State-of-the-Art Survey of Adversarial Reinforcement Learning for IoT Intrusion Detection
14
作者 Qasem Abu Al-Haija Shahad Al Tamimi 《Computers, Materials & Continua》 2026年第4期26-94,共69页
Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Tr... Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Training(AT)enables NIDS agents to discover and prevent newattack paths by exposing them to competing examples,thereby increasing detection accuracy,reducing False Positives(FPs),and enhancing network security.To develop robust decision-making capabilities for real-world network disruptions and hostile activity,NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity.The accuracy and timeliness of the IDS were crucial to the network’s availability and reliability at this time.This paper analyzes ARL applications in NIDS,revealing State-of-The-Art(SoTA)methodology,issues,and future research prospects.This includes Reinforcement Machine Learning(RML)-based NIDS,which enables an agent to interact with the environment to achieve a goal,andDeep Reinforcement Learning(DRL)-based NIDS,which can solve complex decision-making problems.Additionally,this survey study addresses cybersecurity adversarial circumstances and their importance for ARL and NIDS.Architectural design,RL algorithms,feature representation,and training methodologies are examined in the ARL-NIDS study.This comprehensive study evaluates ARL for intelligent NIDS research,benefiting cybersecurity researchers,practitioners,and policymakers.The report promotes cybersecurity defense research and innovation. 展开更多
关键词 Reinforcement learning network intrusion detection adversarial training deep learning cybersecurity defense intrusion detection system and machine learning
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
15
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
CoPt graphitic nanozyme enabled naked-eye identification and colorimetric/fluorescent dual-mode detection of phenylenediamine isomers
16
作者 Luyao Guan Zhaoxin Wang +2 位作者 Shengkai Li Phouphien Keoingthong Zhuo Chen 《Chinese Chemical Letters》 2026年第2期407-414,共8页
Simultaneous identification and quantitative detection of phenylenediamine(PDA)isomers,including o-phenylenediamine(OPD),m-phenylenediamine(MPD),and p-phenylenediamine(PPD),are essential for environmental risk assessm... Simultaneous identification and quantitative detection of phenylenediamine(PDA)isomers,including o-phenylenediamine(OPD),m-phenylenediamine(MPD),and p-phenylenediamine(PPD),are essential for environmental risk assessment and human health protection.However,current visual detection methods can only distinguish individual PDA isomers and failed to identify binary or ternary mixtures.Herein,a highly active and ultrastable peroxidase(POD)-like CoPt graphitic nanozyme was used for naked-eye identification and colorimetric/fluorescent(FL)dual-mode quantitative detection of PDA isomers.The CoPt@G nanozyme effectively catalyzed the oxidation of OPD,MPD,PPD,OPD+PPD,OPD+MPD,MPD+PPD and OPD+MPD+PPD into yellow,colorless,lilac,yellow,yellow,wine red and reddish-brown products,respectively,in the presence of H_(2)O_(2).Thus,the MPD,PPD,MPD+PPD and OPD+MPD+PPD were easily identified based on the distinct color of their oxidation products,and the OPD,OPD+PPD,OPD+MPD could be further identified by the additional addition of MPD or PPD.Subsequently,CoPt@G/H_(2)O_(2)-,a 3,3′,5,5′-tetramethylbenzidine(TMB)/CoPt@G/H_(2)O_(2)-,and MPD/CoPt@G/H_(2)O_(2)-enabled colorimetric/FL dual-mode platforms for the quantitative detection of OPD,MPD and PPD were proposed.The experimental results illustrated that the constructed sensing platforms exhibit satisfactory sensitivity,comparable to that reported in previous studies.Finally,the evaluation of PDAs in water samples was realized,yielding satisfactory recoveries.This work expanded the application prospects of nanozymes in assessing environmental risks and protection of human security. 展开更多
关键词 Copt graphitic nanozyme Phenylenediamine isomers Naked-eye identification Colorimetric detection Fluorescent detection
原文传递
Non-Euclidean Models for Fraud Detection in Irregular Temporal Data Environments
17
作者 Boram Kim Guebin Choi 《Computers, Materials & Continua》 2026年第4期1771-1787,共17页
Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequen... Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios. 展开更多
关键词 Anomaly detection credit card transactions fraud detection graph convolutional networks non-euclidean data
在线阅读 下载PDF
A Hybrid Deep Learning Approach for Real-Time Cheating Behaviour Detection in Online Exams Using Video Captured Analysis
18
作者 Dao Phuc Minh Huy Gia Nhu Nguyen Dac-Nhuong Le 《Computers, Materials & Continua》 2026年第3期1179-1198,共20页
Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning appr... Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning approach that combines visual detection and temporal behaviour classification.The methodology utilises object detection models—You Only Look Once(YOLOv12),Faster Region-based Convolutional Neural Network(RCNN),and Single Shot Detector(SSD)MobileNet—integrated with classification models such as Convolutional Neural Networks(CNN),Bidirectional Gated Recurrent Unit(Bi-GRU),and CNN-LSTM(Long Short-Term Memory).Two distinct datasets were used:the Online Exam Proctoring(EOP)dataset from Michigan State University and the School of Computer Science,Duy Tan Unievrsity(SCS-DTU)dataset collected in a controlled classroom setting.A diverse set of cheating behaviours,including book usage,unauthorised interaction,internet access,and mobile phone use,was categorised.Comprehensive experiments evaluated the models based on accuracy,precision,recall,training time,inference speed,and memory usage.We evaluate nine detector-classifier pairings under a unified budget and score them via a calibrated harmonic mean of detection and classification accuracies,enabling deployment-oriented selection under latency and memory constraints.Macro-Precision/Recall/F1 and Receiver Operating Characteristic-Area Under the Curve(ROC-AUC)are reported for the top configurations,revealing consistent advantages of object-centric pipelines for fine-grained cheating cues.The highest overall score is achieved by YOLOv12+CNN(97.15%accuracy),while SSD-MobileNet+CNN provides the best speed-efficiency trade-off for edge devices.This research provides valuable insights into selecting and deploying appropriate deep learning models for maintaining exam integrity under varying resource constraints. 展开更多
关键词 Online exam proctoring cheating behavior detection deep learning real-time monitoring object detection human behavior recognition
在线阅读 下载PDF
CCLNet:An End-to-End Lightweight Network for Small-Target Forest Fire Detection in UAV Imagery
19
作者 Qian Yu Gui Zhang +4 位作者 Ying Wang Xin Wu Jiangshu Xiao Wenbing Kuang Juan Zhang 《Computers, Materials & Continua》 2026年第3期1381-1400,共20页
Detecting small forest fire targets in unmanned aerial vehicle(UAV)images is difficult,as flames typically cover only a very limited portion of the visual scene.This study proposes Context-guided Compact Lightweight N... Detecting small forest fire targets in unmanned aerial vehicle(UAV)images is difficult,as flames typically cover only a very limited portion of the visual scene.This study proposes Context-guided Compact Lightweight Network(CCLNet),an end-to-end lightweight model designed to detect small forest fire targets while ensuring efficient inference on devices with constrained computational resources.CCLNet employs a three-stage network architecture.Its key components include three modules.C3F-Convolutional Gated Linear Unit(C3F-CGLU)performs selective local feature extraction while preserving fine-grained high-frequency flame details.Context-Guided Feature Fusion Module(CGFM)replaces plain concatenation with triplet-attention interactions to emphasize subtle flame patterns.Lightweight Shared Convolution with Separated Batch Normalization Detection(LSCSBD)reduces parameters through separated batch normalization while maintaining scale-specific statistics.We build TF-11K,an 11,139-image dataset combining 9139 self-collected UAV images from subtropical forests and 2000 re-annotated frames from the FLAME dataset.On TF-11K,CCLNet attains 85.8%mAP@0.5,45.5%mean Average Precision(mAP)@[0.5:0.95],87.4%precision,and 79.1%recall with 2.21 M parameters and 5.7 Giga Floating-point Operations Per Second(GFLOPs).The ablation study confirms that each module contributes to both accuracy and efficiency.Cross-dataset evaluation on DFS yields 77.5%mAP@0.5 and 42.3%mAP@[0.5:0.95],indicating good generalization to unseen scenes.These results suggest that CCLNet offers a practical balance between accuracy and speed for small-target forest fire monitoring with UAVs. 展开更多
关键词 Forest fire detection lightweight convolutional neural network UAV images small-target detection CCLNet
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部