X Wang, W Liu, H Lin, J Hu, K Kaur… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The vigorous development of positioning technology and ubiquitous computing has spawned trajectory big data. By analyzing and processing the trajectory big data in the form …
In recent years, the proliferation of deep learning (DL) techniques has given rise to a significant challenge in the form of deepfake videos, posing a grave threat to the authenticity …
Vehicle detection and classification are the most significant and challenging activities of an intelligent traffic monitoring system. Traditional methods are highly computationally …
J Xiong, J Yang, L Yan, M Awais, AA Khan… - Expert Systems with …, 2024 - Elsevier
Plagiarism detection (PD) in natural language processing involves locating similar words in two distinct sources. The paper introduces a new approach to plagiarism detection utilizing …
Abstract Software Defined Networking (SDN) is a new network architecture theoretical framework, which based on the partition of the control plane and the data plane. Some of the …
S Sai, U Yashvardhan, V Chamola, B Sikdar - IEEE Access, 2024 - ieeexplore.ieee.org
This research paper intends to provide real-life applications of Generative AI (GAI) in the cybersecurity domain. The frequency, sophistication and impact of cyber threats have …
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
Video-based human activity recognition (HAR) is an important task in many fields, such as healthcare monitoring, video surveillance, and sports analysis. This review paper aims to …
H Zheng, H Zhao, G Ahmadi - Journal of Complex Networks, 2024 - academic.oup.com
Complex network analysis is inspired by empirical studies of real-world networks such as computer networks, technology networks and social networks. The analysis of community …