Rumor Detection with a novel graph neural network approach
The wide spread of rumors on social media has caused a negative impact on people's daily
life, leading to potential panic, fear, and mental health problems for the public. How to …
life, leading to potential panic, fear, and mental health problems for the public. How to …
Image Captioning in news report scenario
Image captioning strives to generate pertinent captions for specified images, situating itself
at the crossroads of Computer Vision (CV) and Natural Language Processing (NLP). This …
at the crossroads of Computer Vision (CV) and Natural Language Processing (NLP). This …
Feature manipulation for ddpm based change detection
Z Li, Y Huang, M Zhu, J Zhang, JH Chang… - arxiv preprint arxiv …, 2024 - arxiv.org
Change Detection is a classic task of computer vision that receives a bi-temporal image pair
as input and separates the semantically changed and unchanged regions of it. The diffusion …
as input and separates the semantically changed and unchanged regions of it. The diffusion …
Comprehensive evaluation of Mal-API-2019 dataset by machine learning in malware detection
This study conducts a thorough examination of malware detection using machine learning
techniques, focusing on the evaluation of various classification models using the Mal-API …
techniques, focusing on the evaluation of various classification models using the Mal-API …
Adaptive ensembles of fine-tuned transformers for llm-generated text detection
Large language models (LLMs) have reached human-like proficiency in generating diverse
textual content, underscoring the necessity for effective fake text detection to avoid potential …
textual content, underscoring the necessity for effective fake text detection to avoid potential …
[HTML][HTML] IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks
Abstract Securing Internet of Things (IoT) devices is paramount to mitigate unauthorised
access and potential cyber threats, safeguarding the integrity of transmitted and processed …
access and potential cyber threats, safeguarding the integrity of transmitted and processed …
Securing the grid: A comprehensive analysis of cybersecurity challenges in PMU-based cyber-physical power networks
The threat of cyber-attacks poses a considerable risk to Phasor Measurement Unit (PMU)
applications within Cyber-Physical Power Networks (CPPNs), leaving them susceptible to …
applications within Cyber-Physical Power Networks (CPPNs), leaving them susceptible to …
Precision strike: Precise backdoor attack with dynamic trigger
Q Li, W Chen, X Xu, Y Zhang, L Wu - Computers & Security, 2025 - Elsevier
Deep neural networks have advanced significantly in the last several years and are now
widely employed in numerous significant real-world applications. However, recent research …
widely employed in numerous significant real-world applications. However, recent research …
[HTML][HTML] Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection
Phishing attacks are on the rise, and phishing websites are everywhere, denoting the
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …
Adversarial examples in the physical world: A survey
Deep neural networks (DNNs) have demonstrated high vulnerability to adversarial
examples, raising broad security concerns about their applications. Besides the attacks in …
examples, raising broad security concerns about their applications. Besides the attacks in …