Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy and security enhancement of smart cities using hybrid deep learning-enabled blockchain
The emergence of the Internet of Things (IoT) accelerated the implementation of various
smart city applications and initiatives. The rapid adoption of IoT-powered smart cities is …
smart city applications and initiatives. The rapid adoption of IoT-powered smart cities is …
Dl-ads: Improved grey wolf optimization enabled ae-lstm technique for efficient network anomaly detection in internet of thing edge computing
J Manokaran, G Vairavel - IEEE Access, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) technology has begun to proliferate in recent years, which
simultaneously increases the number of attacks. Owing to the massive volume and multi …
simultaneously increases the number of attacks. Owing to the massive volume and multi …
Unsupervised Machine Learning for Cybersecurity Anomaly Detection in Traditional and Software-Defined Networking Environments
C Rookard, A Khojandi - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
Cybersecurity has become a field of increasing importance within the past years, with the
National Academy of Engineering most recently designating securing cyberspace as one of …
National Academy of Engineering most recently designating securing cyberspace as one of …
An automated approach for fibroblast cell confluency characterisation and sample handling using aiot for bio-research and bio-manufacturing
Current methods used in cell culture monitoring, characterisation and handling are manual,
time consuming and highly dependent on subjective observations made by human …
time consuming and highly dependent on subjective observations made by human …
Subspace‐Based Anomaly Detection for Large‐Scale Campus Network Traffic
X Zhao, Q Wu - Journal of Applied Mathematics, 2023 - Wiley Online Library
With the continuous development of information technology and the continuous progress of
traffic bandwidth, the types and methods of network attacks have become more complex …
traffic bandwidth, the types and methods of network attacks have become more complex …
[PDF][PDF] A deep learning algorithm-based visual strategy intervention study for children with autism spectrum disorders–extraction and detection of children's behavioral …
Y Lin - European Review for Medical & Pharmacological …, 2023 - researchgate.net
OBJECTIVE: Autism spectrum disorder is a group of neurodevelopmental disorders. The
disease's etiology is unclear, and there is no specific drug treatment for the core symptoms …
disease's etiology is unclear, and there is no specific drug treatment for the core symptoms …
TwoDCA: A 2-Dimensional Dendritic Cell Algorithm with Dynamic Cell Migration
J Greensmith, L Yang - 2022 IEEE Congress on Evolutionary …, 2022 - ieeexplore.ieee.org
The Dendritic Cell Algorithm (DCA) is a multi-agent artificial immune system designed for
anomaly detection. The algorithm is composed of artificial dendritic cell agents that process …
anomaly detection. The algorithm is composed of artificial dendritic cell agents that process …
Distributed denial of service attack detection using machine learning classifiers
R Gautam, R Padmavathy - International Journal of Ad Hoc …, 2024 - inderscienceonline.com
Online services risk distributed denial of service attacks due to their availability. These
attacks overload system resources and make them unusable by legitimate users. This study …
attacks overload system resources and make them unusable by legitimate users. This study …
A Comparative Analysis of Snort and Dendritic Cell Algorithm in Intrusion Detection Systems
In this study, we compare the performance of snort and dendritic cell algorithm (DCA) as
intrusion detection systems (IDS) based on several key metrics. The evaluation results show …
intrusion detection systems (IDS) based on several key metrics. The evaluation results show …
Dendritic Cell Algorithm with Bayesian Optimization Hyperband for Signal Fusion.
D Zhang, Y Zhang, Y Liang - Computers, Materials & …, 2023 - search.ebscohost.com
The dendritic cell algorithm (DCA) is an excellent prototype for develo** Machine
Learning inspired by the function of the powerful natural immune system. Too many …
Learning inspired by the function of the powerful natural immune system. Too many …