Search alternatives:
changes » change (Expand Search)
decrease » increase (Expand Search)
datasets » dataset (Expand Search)
Showing 41 - 60 results of 293 for search '(( significant ((changes decrease) OR (largest decrease)) ) OR ( significant detection datasets ))', query time: 0.12s Refine Results
  1. 41

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. …”
  2. 42

    Automated Detection of Colorectal Polyp Utilizing Deep Learning Methods With Explainable AI by Md. Faysal Ahamed (21842396)

    Published 2024
    “…These polyps cause severe conditions in the colon or rectum, presenting a significant diagnostic challenge. Traditional manual detection through medical imaging is not only bulky and prone to errors but also incurs substantial costs, requiring expert endoscopist. …”
  3. 43

    An efficient artificial intelligence approach for early detection of cross-site scripting attacks by Younas, Faizan

    Published 2024
    “…Cross-Site Scripting (XSS) attacks continue to pose a significant threat to web applications, compromising the security and integrity of user data. …”
    Get full text
  4. 44

    Bridging Innovation and Security: Advancing Cyber-Threat Detection in Sustainable Smart Infrastructure by Duaa Shoukat (20961200)

    Published 2025
    “…This significant improvement over existing models underscores the efficacy of our approach in mitigating cyber-threats in smart infrastructure environments.…”
  5. 45

    Diabetic Foot Ulcer Detection: Combining Deep Learning Models for Improved Localization by Rusab Sarmun (17632269)

    Published 2024
    “…Our WBF-based approach combining YOLOv8m and FRCNN-ResNet101 achieves a mean average precision (mAP) score of 86.4% at the IoU threshold of 0.5 on the DFUC2020 dataset, significantly outperforming the former benchmark by 12.4%. …”
  6. 46

    Toward Adaptive Intrusion Detection Systems for UAVs Using Cyber-Physical Image Analysis by Hanane Amirat (23126110)

    Published 2025
    “…Despite the growing body of research on intrusion detection systems (IDS) for UAVs, many existing solutions exhibit significant limitations, including a reliance on synthetic datasets and binary classification frameworks. …”
  7. 47

    Effect of Intravenous Mannitol on Intraocular Pressure Changes in Vitrectomized and Non-Vitrectomized Eyes: A Systematic Review and Meta-Analysis by HASHEM ABU SERHAN (19737499)

    Published 2024
    “…No significant changes were observed on IOP with mannitol administration when comparing vitrectomized versus non- vitrectomized eyes.…”
  8. 48

    Hybrid Model for Detection of Cervical Cancer Using Causal Analysis and Machine Learning Techniques by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…This research proposed an efficient feature selection and prediction model for cervical cancer datasets using Boruta analysis and SVM method to deal with this challenge. …”
  9. 49

    A Novel Versatile Framework for Enabling Early Detection of Evolving Network-based Cyberattacks by THOMAS, RAJESH

    Published 2025
    “…Histogram of Oriented Gradients (HOG), entropy byte histogram, byte-based feature learning, and representation learning from bytes, were used to demonstrate the applicability of the FPAC framework for early attack detection. Experiments were performed to validate the FPAC approach using the CTU botnet and the UTSA 2021 LDoS datasets. …”
    Get full text
  10. 50

    Fourier Transform Infrared Imaging—A Novel Approach to Monitor Bio Molecular Changes in Subacute Mild Traumatic Brain Injury by Fazle Rakib (5768069)

    Published 2021
    “…Significant decrease in methyl content and a significant increase in olefinic content were observed in Co and CC regions of mTBI rat brain tissues. …”
  11. 51
  12. 52

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT by Harun Surej Ilango (17545728)

    Published 2022
    “…The Canadian Institute of Cybersecurity Denial of Service 2017 (CIC DoS 2017) dataset is used for the study. An iterative wrapper-based feature selection using Support Vector Machine (SVM) is used to derive the significant features required for detection. …”
  13. 53
  14. 54

    PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping by Arvind Prasad (19997799)

    Published 2024
    “…This paper introduces PermGuard, a scalable framework for Android malware detection that maps permissions into exploitation techniques and employs incremental learning to detect malicious apps. …”
  15. 55

    Crowd behavior detection: leveraging video swin transformer for crowd size and violence level analysis by Marwa Qaraqe (10135172)

    Published 2024
    “…<p dir="ltr">In recent years, crowd behavior detection has posed significant challenges in the realm of public safety and security, even with the advancements in surveillance technologies. …”
  16. 56

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
  17. 57

    Enhancing waste sorting and recycling efficiency: robust deep learning-based approach for classification and detection by Faizul Rakib Sayem (21399890)

    Published 2024
    “…Additionally, we introduced the GELAN-E (generalized efficient layer aggregation network) model for waste object detection tasks, obtaining a mean average precision (mAP50) of 63%, surpassing other state-of-the-art detection models. …”
  18. 58

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives by Yassine Himeur (14158821)

    Published 2021
    “…Following, insights about current research trends are discussed to widen the applications and effectiveness of the anomaly detection technology before deriving future directions attracting significant attention. …”
  19. 59
  20. 60

    Assessing the Built Environment’s Reflectivity, Flexibility, Resourcefulness, and Rapidity Resilience Qualities against Climate Change Impacts from the Perspective of Different Sta... by Mohammed M. Al-Humaiqani (18325554)

    Published 2023
    “…<p dir="ltr">The frequency and severity of climate change are projected to increase, leading to more disasters, increased built environment system (BES) vulnerability, and decreased coping capacity. …”