Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Protecting autonomous UAVs from GPS spoofing and jamming: A comparative analysis of detection and mitigation techniques
P Joeaneke, O Obioha Val, OO Olaniyi… - … Olumide Samuel and …, 2024 - papers.ssrn.com
This study investigates the vulnerabilities of unmanned aerial vehicles (UAVs) to GPS
spoofing and jamming, addressing three key research questions:(1) What are the common …
spoofing and jamming, addressing three key research questions:(1) What are the common …
[PDF][PDF] Leveraging advanced machine learning algorithms for enhanced cyberattack detection on US business networks
Cyberattacks' rising volume and sophistication have made conventional security measures,
such as firewalls, signature-based intrusion detection systems, and antivirus software …
such as firewalls, signature-based intrusion detection systems, and antivirus software …
Revolutionizing online education: Advanced facial expression recognition for real-time student progress tracking via deep learning model
M Aly - Multimedia Tools and Applications, 2024 - Springer
This paper presents a groundbreaking online educational platform that utilizes facial
expression recognition technology to track the progress of students within the classroom …
expression recognition technology to track the progress of students within the classroom …
Harnessing Machine Learning Intelligence Against Cyber Threats: Navigating Legal and Ethical Challenges in Global Cyber Investigations
B Singh, C Kaunert, R Gautam - … Entrepreneurial Mindsets With AI, 2024 - igi-global.com
The spread of cyberthreats in the digital age presents serious concerns to national security,
the stability of the economy, and personal privacy. Traditional security methods are unable …
the stability of the economy, and personal privacy. Traditional security methods are unable …
Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
Cybersecurity refers to the actions that are used by people and companies to protect
themselves and their information from cyber threats. Different security methods have been …
themselves and their information from cyber threats. Different security methods have been …
Weakly-supervised thyroid ultrasound segmentation: Leveraging multi-scale consistency, contextual features, and bounding box supervision for accurate target …
M Aly - Computers in Biology and Medicine, 2025 - Elsevier
Weakly-supervised learning (WSL) methods have gained significant attention in medical
image segmentation, but they often face challenges in accurately delineating boundaries …
image segmentation, but they often face challenges in accurately delineating boundaries …
[HTML][HTML] Performance optimization for hybrid TS/PS SWIPT UAV in cooperative NOMA IoT networks
This study examines a cooperative non-orthogonal multiple access (NOMA) network utilizing
an energy-constrained unmanned aerial vehicle (UAV) relay (UAVR) to expand coverage …
an energy-constrained unmanned aerial vehicle (UAV) relay (UAVR) to expand coverage …
Enhanced SVM and RNN Classifier for Cyberattacks Detection in Underwater Wireless Sensor Networks.
AI Altameemi, SJ Mohammed… - … Journal of Safety & …, 2024 - search.ebscohost.com
Researchers have been paying greater attention to Underwater Wireless Sensor Networks
(UWSN) lately because of their advancements in ocean surveillance, application …
(UWSN) lately because of their advancements in ocean surveillance, application …
AutoGMM-RWKV: A Detecting Scheme Based on Attention Mechanisms Against Selective Forwarding Attacks in Wireless Sensor Networks
S **e, Y Li, Y Ma, Y Wu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Integrating Wireless Sensor Networks (WSNs) technologies into Internet of Things amplifies
their monitoring capabilities by enabling real-time data collection and analysis across …
their monitoring capabilities by enabling real-time data collection and analysis across …
[HTML][HTML] Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm
Wireless Sensor Networks are formed by tiny, self-contained, battery-powered computers
with radio links that can sense their surroundings for events of interest and store and …
with radio links that can sense their surroundings for events of interest and store and …