[HTML][HTML] A malicious code detection method based on FF-MICNN in the internet of things
W Zhang, Y Feng, G Han, H Zhu, X Tan - Sensors, 2022 - mdpi.com
It is critical to detect malicious code for the security of the Internet of Things (IoT). Therefore,
this work proposes a malicious code detection algorithm based on the novel feature fusion …
this work proposes a malicious code detection algorithm based on the novel feature fusion …
CBIF-M: A content-based image filtering and retrieval scheme using multi-classifier filtering framework
Recently, the image retrieval process appears to be a challenging task to filter out a huge
volume of objectionable images from retrieval. It is very easy for people of all ages to obtain …
volume of objectionable images from retrieval. It is very easy for people of all ages to obtain …
Fine-Grained Pornographic Image Recognition with Multi-Instance Learning.
Z Wu, B Xie - Computer Systems Science & Engineering, 2023 - search.ebscohost.com
Image has become an essential medium for expressing meaning and disseminating
information. Many images are uploaded to the Internet, among which some are …
information. Many images are uploaded to the Internet, among which some are …
PiWall as a home traffic controller: enabling parental control and monitoring
NI Abd Razak, S Kamarudin, MIM Shuhud… - Bulletin of Electrical …, 2024 - beei.org
The movement control order (MCO) has led to a surge in internet usage among children,
becoming the new normal. Most countries heavily rely on online platforms for education …
becoming the new normal. Most countries heavily rely on online platforms for education …
[PDF][PDF] Multimodal fusion sensitive information classification based on mixed attention and CLIP model
S Huanga, Z Zhanga, B Songa, Y Maoa - Journal of Intelligent & Fuzzy …, 2023 - hncsa.org.cn
Social network attackers leverage images and text to disseminate sensitive information
associated with pornography, politics, and terrorism, causing adverse effects on society. The …
associated with pornography, politics, and terrorism, causing adverse effects on society. The …
A prospective recommender system based on
YM Zhou, YY Yang - Soft Computing, 2023 - Springer
The previous works on recommending rarely involve reducing the malice eliminating time or
enhancing the reliability of data and the trustworthiness of the investigator performing the …
enhancing the reliability of data and the trustworthiness of the investigator performing the …
Artificial Intelligence-enabled Bright Internet
M El-dosuky - Available at SSRN 4947379, 2024 - papers.ssrn.com
The Internet, a global interconnected network of computer networks, is crucial for daily life,
economy, and safety. Its rapid proliferation has made it nearly impossible to function without …
economy, and safety. Its rapid proliferation has made it nearly impossible to function without …
Multimodal fusion sensitive information classification based on mixed attention and CLIP model 1
S Huang, Z Zhang, B Song… - Journal of Intelligent & …, 2023 - content.iospress.com
Social network attackers leverage images and text to disseminate sensitive information
associated with pornography, politics, and terrorism, causing adverse effects on society. The …
associated with pornography, politics, and terrorism, causing adverse effects on society. The …
Mitigating Health Risks and Ensuring Safe Video Streaming Environments through Automated Video Content Moderation
M Kumar, T Yuvaraj, GS Priya… - … Systems Security (iQ …, 2023 - ieeexplore.ieee.org
Automated content moderation systems have become essential for maintaining a safe and
healthy online environment with the ever-increasing amount of video content on the internet …
healthy online environment with the ever-increasing amount of video content on the internet …
Child Access Control Based on Age and Personality Traits
AM Rasim, FJ Abdullayeva… - … Conference on Computer …, 2023 - Springer
Exposure to harmful information on the Internet and constant use of digital devices
(computer, phone, tablet, etc.) harm children's psychology and health. The use of methods …
(computer, phone, tablet, etc.) harm children's psychology and health. The use of methods …