Cerebrovascular 发表于 2025-3-25 07:07:20

http://reply.papertrans.cn/48/4701/470015/470015_21.png

发源 发表于 2025-3-25 09:05:06

http://reply.papertrans.cn/48/4701/470015/470015_22.png

带子 发表于 2025-3-25 11:48:00

,Detection of Fake URLs Using Deep LSTM Architecture over Social Media,enience comes with challenges as Clickbait and malicious activities pose significant risks to users and such cybercrimes result in substantial financial losses annually. Addressing this issue is paramount to safeguard users and maintain the integrity of OSNs. This study proposes a two-level Uniform

拥挤前 发表于 2025-3-25 19:00:44

http://reply.papertrans.cn/48/4701/470015/470015_24.png

Mortal 发表于 2025-3-25 22:08:32

,A Hybrid Differential-Evolution-Based Approach to the Sensor Network Localisation Problem,calisation problem can be mathematically formulated as a graph realisation problem where the positions of the nodes have to be estimated based on the information about some other nodes. To solve this problem, we propose a hybrid differential evolution algorithm. Comparisons with other methods conduc

JAMB 发表于 2025-3-26 03:35:40

A Review on Physical Abuse Detection Techniques Using Video Surveillance Systems,ention as a potential tool for detecting and preventing physical abuse incidents. This review paper presents an in-depth analysis of the existing literature on physical abuse detection using video surveillance systems. The review begins by discussing the importance of physical abuse detection, appli

alleviate 发表于 2025-3-26 05:53:12

http://reply.papertrans.cn/48/4701/470015/470015_27.png

Asparagus 发表于 2025-3-26 11:12:39

,A Simple Genetic Algorithm for the Maximum Min-Sum Dispersion Problem (Max-MinSum DP) and New Node cle, a new genetic algorithm is proposed to solve the base variant of the problem. Comparisons with other methods show the effectiveness of the proposed algorithm. As a further step, we extend the dispersion problem: Instead of the basic distance function, other node similarity-based measures are us

言行自由 发表于 2025-3-26 16:36:42

Towards Analysis of Threat Modeling of Software Systems According to Key Criteria,rious techniques and methodologies are integrated to ensure software security in the software development life cycle. This includes applying diverse approaches and methodologies for preventing threats and attacks on software. Various methodologies, such as modeling potential threats and attacks on s

上腭 发表于 2025-3-26 19:16:11

,Deepfake Detection System for Facial Evidence Verification in Criminal Justice and Its Legal and Etvideos and images raises concerns about the authenticity and admissibility of such evidence in court. This research proposes a deepfake detection system for facial evidence verification to combat the threat of deepfake technology on facial evidence in criminal justice. Our experimental results indic
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Intelligent Systems Design and Applications; Information and Netw Ajith Abraham,Sabri Pllana,Patrick Siarry Conference proceedings 2024 The