Showing 161 to 170 of 352 articles
Clear Filters
Scientific reports
Sep 19, 2022
Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It's Zero-day variants are even more hazardous, as less is known about them. In this regard, when used for ransomware attack detection, conventional mac...
Neural networks : the official journal of the International Neural Network Society
Sep 17, 2022
This paper develops two neurodynamic approaches for solving the L-minimization problem with the linear inequality constraints. First, a centralized neurodynamic approach is proposed based on projection operator and nonnegative quadrant. The stability...
Sensors (Basel, Switzerland)
Sep 15, 2022
The literature is rich in techniques and methods to perform Continuous Authentication (CA) using biometric data, both physiological and behavioral. As a recent trend, less invasive methods such as the ones based on context-aware recognition allows th...
IEEE transactions on pattern analysis and machine intelligence
Sep 14, 2022
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendation, information retrieval and so on, attackers have strong motivation and incentives to manipulate or disrupt the ranking list. They could inject malicious c...
Revista de saude publica
Sep 12, 2022
Artificial intelligence develops rapidly and health is one of the areas where new technologies in this field are most promising. The use of artificial intelligence can modify the way health care and self-care are provided, besides influencing the org...
Sensors (Basel, Switzerland)
Aug 29, 2022
The frequent incidents of password leakage have increased people's attention and research on password security. Password guessing is an essential part of password cracking and password security research. The progression of deep learning technology pr...
Journal of environmental and public health
Aug 29, 2022
In the era of big data, while every citizen enjoys the convenience of the Internet, all kinds of information closely related to their personal and property are in a state of "streaking" for a long time. Personal information is frequently leaked, ille...
Scientific reports
Aug 17, 2022
Deep learning technology is changing the landscape of cybersecurity research, especially the study of large amounts of data. With the rapid growth in the number of malware, developing of an efficient and reliable method for classifying malware has be...
Sensors (Basel, Switzerland)
Aug 14, 2022
In emergency scenarios where the on-site information is completely lacking or the original environmental state has been completely changed, autonomous and mobile swarm robotics are used to quickly build a rescue support system to ensure the safety of...
Computational intelligence and neuroscience
Aug 3, 2022
A significant study has been undertaken in the areas of health care and administration of cutting-edge artificial intelligence (AI) technologies throughout the previous decade. Healthcare professionals studied smart gadgets and other medical technolo...