[HTML][HTML] Review on application progress of federated learning model and security hazard protection

A Yang, Z Ma, C Zhang, Y Han, Z Hu, W Zhang… - Digital Communications …, 2023 - Elsevier
Federated learning is a new type of distributed learning framework that allows multiple
participants to share training results without revealing their data privacy. As data privacy …

A review of small object and movement detection based loss function and optimized technique

RP Chaturvedi, U Ghose - Journal of Intelligent Systems, 2023 - degruyter.com
The objective of this study is to supply an overview of research work based on video-based
networks and tiny object identification. The identification of tiny items and video objects, as …

Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT

H Alshahrani, M Anjum, S Shahab, MS Al Reshan… - Scientific Reports, 2024 - nature.com
The intrusion detection process is important in various applications to identify unauthorized
Internet of Things (IoT) network access. IoT devices are accessed by intermediators while …

Simulation of sports training recognition system based on internet of things video behavior analysis

J Zhao, Y Zhao, H Wang - Preventive Medicine, 2023 - Elsevier
The video behavior analysis of the Internet of Things is the apparent characteristics and
continuous state of the two-dimensional human body in the time dimension. The patterns …

Seismic Signal Analysis Based on Variational Mode Decomposition and Hilbert Transform for Ground Intrusion Activity Classification

Y Sun, D Qian, J Zheng, Y Liu, C Liu - Sensors, 2023 - mdpi.com
The identification of ground intrusion is a key and important technology in the national public
security field. In this paper, a novel variational mode decomposition (VMD) and Hilbert …

[Retracted] Effect of Basicity on the Microstructure of Sinter and Its Application Based on Deep Learning

JM Zhi, J Li, JH Wang, TY Jiang… - Computational …, 2021 - Wiley Online Library
The influence of the evolution rule of basicity (0.6∼ 2.4) on the mineral composition and
microstructure of sinter is studied by using a polarizing microscope, and the comprehensive …

A Network Security Situation Prediction for Consumer Data in the Internet of Things Using Variational Mode Decomposition (VMD) and fused CNN-BiLSTM-Attention

A Yang, B Xie, Y Liu, L Wang, J Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Consumer data in e-commerce platforms relies heavily on Internet of Things (IoT) devices,
which bring forth numerous security threats. As an emerging proactive defense technology …

FedsNet: the real-time network for pedestrian detection based on RT-DETR

H Peng, S Chen - Journal of Real-Time Image Processing, 2024 - Springer
In response to the problems of complex model networks, low detection accuracy, and the
detection of small targets prone to false detections and omissions in pedestrian detection …

Application of Internet of Things intelligent image-positioning studio classroom in English teaching

J Chen, Y Chen, J Lin - Journal of high speed networks, 2021 - content.iospress.com
The purpose is to minimize color overflow and color patch generation in intelligent images
and promote the application of the Internet of Things (IoT) intelligent image-positioning …

Intrusion detection analysis of internet of things considering practical byzantine fault tolerance (PBFT) algorithm

L Li, Y Chen, B Lin - Wireless Communications and Mobile …, 2021 - Wiley Online Library
In order to improve the security performance and accuracy of the Internet of things in the use
process, it is necessary to use the Internet of things intrusion detection method. At present …