Showing 81 to 90 of 269 articles
Clear Filters
Sensors (Basel, Switzerland)
Apr 16, 2022
Recently, the frequent occurrence of the misuse and intrusion of UAVs has made it a research challenge to identify and detect them effectively, and relatively high bandwidth and pressure on data transmission and real-time processing exist when sampli...
Scientific reports
Apr 15, 2022
The majority of recently demonstrated Deep-Learning Side-Channel Analysis (DLSCA) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the size of the training set is limited, as in...
PloS one
Apr 15, 2022
The classification of biological sequences is an open issue for a variety of data sets, such as viral and metagenomics sequences. Therefore, many studies utilize neural network tools, as the well-known methods in this field, and focus on designing cu...
Computational intelligence and neuroscience
Apr 14, 2022
Color texture classification is a significant computer vision task to identify and categorize textures that we often observe in natural visual scenes in the real world. Without color and texture, it remains a tedious task to identify and recognize ob...
Sensors (Basel, Switzerland)
Apr 13, 2022
Anomaly identification for internal combustion engine (ICE) sensors has become an important research area in recent years. In this work, a proposed indirect fuzzy Lyapunov-based computed ratio observer integrated with a support vector machine (SVM) w...
The American journal of drug and alcohol abuse
Apr 7, 2022
In a continuum with applied statistics, machine learning offers a wide variety of tools to explore, analyze, and understand addiction data. These tools include algorithms that can leverage useful information from data to build models; these models ca...
Sensors (Basel, Switzerland)
Apr 6, 2022
Software products from all vendors have vulnerabilities that can cause a security concern. Malware is used as a prime exploitation tool to exploit these vulnerabilities. Machine learning (ML) methods are efficient in detecting malware and are state-o...
Sensors (Basel, Switzerland)
Apr 2, 2022
In this paper, we present a novel Deep Neural Network-based indoor localization method that estimates the position of a Bluetooth Low Energy (BLE) transmitter (tag) by using the received signals' characteristics at multiple Anchor Points (APs). We us...
Sensors (Basel, Switzerland)
Apr 2, 2022
Recovering and distinguishing different ionospheric layers and signals usually requires slow and complicated procedures. In this work, we construct and train five convolutional neural network (CNN) models: DeepLab, fully convolutional DenseNet24 (FC-...
Scientific reports
Mar 19, 2022
Malware threat the security of computers and Internet. Among the diversity of malware, we have "ransomware". Its main objective is to prevent and block access to user data and computers in exchange for a ransom, once paid, the data will be liberated....