咨询与建议

限定检索结果

文献类型

  • 13 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 11 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 7 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 3 篇 交通运输工程
    • 2 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 安全科学与工程
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
  • 1 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 19 篇 proactive detect...
  • 2 篇 continuous risk ...
  • 2 篇 photovoltaic sys...
  • 2 篇 hot spot identif...
  • 2 篇 fault detection
  • 1 篇 collaborative fi...
  • 1 篇 arc discharge
  • 1 篇 fault diagnosis
  • 1 篇 botnet
  • 1 篇 physics-aware wa...
  • 1 篇 node ranking
  • 1 篇 arc discharges
  • 1 篇 deep learning
  • 1 篇 cyber-physical c...
  • 1 篇 unknown input ob...
  • 1 篇 adolescents
  • 1 篇 adversarial lear...
  • 1 篇 microgrids
  • 1 篇 long short-term ...
  • 1 篇 throughput

机构

  • 2 篇 army engn univ p...
  • 1 篇 base hosp dept p...
  • 1 篇 pohang univ sci ...
  • 1 篇 korea adv inst s...
  • 1 篇 univ glasgow sch...
  • 1 篇 argonne natl lab...
  • 1 篇 california depar...
  • 1 篇 hebei univ techn...
  • 1 篇 university of ra...
  • 1 篇 harbin inst tech...
  • 1 篇 univ twente desi...
  • 1 篇 queensland unive...
  • 1 篇 northumbria univ...
  • 1 篇 univ oxford math...
  • 1 篇 cardiff univ sch...
  • 1 篇 temple univ dept...
  • 1 篇 ciena corporatio...
  • 1 篇 spotify ltd engl...
  • 1 篇 univ calif berke...
  • 1 篇 university of ra...

作者

  • 2 篇 shi hui
  • 2 篇 che bohan
  • 2 篇 yang weiwei
  • 1 篇 kim juhyun
  • 1 篇 karadimas petros
  • 1 篇 azhari vahid
  • 1 篇 koppenol-gonzale...
  • 1 篇 ma ruiqian
  • 1 篇 nakamura akihito
  • 1 篇 dietz christian
  • 1 篇 kommu john vijay...
  • 1 篇 sheng dejie
  • 1 篇 jang kitae
  • 1 篇 epiphaniou grego...
  • 1 篇 jeyakumar p. jud...
  • 1 篇 washington simon
  • 1 篇 cresci stefano
  • 1 篇 kwon ki hoon
  • 1 篇 pras aiko
  • 1 篇 al-khateeb haide...

语言

  • 17 篇 英文
  • 2 篇 其他
检索条件"主题词=Proactive Detection"
19 条 记 录,以下是1-10 订阅
排序:
Consumption-based approaches in proactive detection for content moderation
收藏 引用
EPJ DATA SCIENCE 2024年 第1期13卷 70页
作者: Elisha, Shahar Pougue-Biyong, John N. Beguerisse-Diaz, Mariano Spotify Ltd London England Univ Oxford Math Inst Oxford England
Implementing effective content moderation systems at scale is an unavoidable and complex challenge facing technology platforms. Developing systems that automate detection and removal of violative content is fraught wi... 详细信息
来源: 评论
Covert Multi-Channel Communication Against Interference-Assisted proactive detection
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2024年 第9期73卷 14033-14037页
作者: Che, Bohan Shi, Hui Lu, Xingbo Gao, Chang Yang, Weiwei Liu, Jue Jiang, Junhao Army Engn Univ PLA Coll Commun Engn Nanjing 210007 Peoples R China Acad Mil Sci PLA Beijing 100091 Peoples R China Beijing Univ Posts & Telecommun Coll Informat & Commun Engn Beijing 100876 Peoples R China Jinling Inst Technol Sch Network Secur Nanjing 211169 Peoples R China
In this article, covert multi-channel communication against interference-assisted proactive detection is investigated in additive Gaussian white noise (AWGN) channel. We first analyze the detection performance for the... 详细信息
来源: 评论
Covert Wireless Communication Against Jamming-Assisted proactive detection
收藏 引用
IEEE WIRELESS COMMUNICATIONS LETTERS 2023年 第8期12卷 1304-1308页
作者: Che, Bohan Shi, Hui Yang, Weiwei Guan, Xinrong Ma, Ruiqian Army Engn Univ PLA Coll Commun Engn Nanjing 210007 Peoples R China
In this letter, we consider the covert wireless communication (CWC) against a jamming-assisted proactive detector in two scenarios corresponding to whether Alice utilizes the jamming to hide the communication signals.... 详细信息
来源: 评论
proactive detection of people in need of mental healthcare: accuracy of the community case detection tool among children, adolescents and families in Sri Lanka
收藏 引用
CHILD AND ADOLESCENT PSYCHIATRY AND MENTAL HEALTH 2021年 第1期15卷 1页
作者: van den Broek, Myrthe Ponniah, Puvaneswary Jeyakumar, P. Judy Ramesh Koppenol-Gonzalez, Gabriela, V Kommu, John Vijay Sagar Kohrt, Brandon A. Jordans, Mark J. D. War Child Holland Res & Dev Amsterdam Netherlands Univ Amsterdam Amsterdam Inst Social Sci Res Amsterdam Netherlands War Child Holland Res & Dev Colombo Sri Lanka Base Hosp Dept Psychiat Valaichchenai Sri Lanka Natl Inst Mental Hlth & Neurosci NIMHANS Dept Child & Adolescent Psychiat Bangalore Karnataka India George Washington Univ Dept Psychiat & Behav Sci Washington DC USA
Background Most children and adolescents in need of mental healthcare remain untreated even when services are available. This study evaluates the accuracy of a new tool, the Community Case detection Tool (CCDT). The C... 详细信息
来源: 评论
Towards Adversarial Resilience in proactive detection of Botnet Domain Names by using MTD
Towards Adversarial Resilience in Proactive Detection of Bot...
收藏 引用
IEEE/IFIP Network Operations and Management Symposium (NOMS)
作者: Dietz, Christian Dreo, Gabi Sperotto, Anna Pras, Aiko Bundeswehr Univ Munich Res Inst CODE Neubiberg Germany Univ Twente Design & Anal Commun Syst Enschede Netherlands
Artificial Intelligence is often part of state-of-the-art Intrusion detection Systems. However, attackers use Artificial Intelligence to improve their attacks and circumvent IDS systems. Botnets use artificial intelli... 详细信息
来源: 评论
proactive Threat detection for Connected Cars Using Recursive Bayesian Estimation
收藏 引用
IEEE SENSORS JOURNAL 2018年 第12期18卷 4822-4831页
作者: al-Khateeb, Haider Epiphaniou, Gregory Reviczky, Adam Karadimas, Petros Heidari, Hadi Univ Wolverhampton Wolverhampton Cyber Res Inst Sch Math & Comp Sci Wolverhampton WV1 1LY W Midlands England Northumbria Univ Dept Engn & Environm London Campus London E1 7HT England Univ Glasgow Sch Engn Glasgow G12 8QQ Lanark Scotland
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures ... 详细信息
来源: 评论
Big Data Analytics for proactive Financial Fraud detection and Prevention  2
Big Data Analytics for Proactive Financial Fraud Detection a...
收藏 引用
2nd International Conference on Technology Innovation and Its Applications, ICTIIA 2024
作者: Hasudungan, Yehezkeil Oganda, Fitra Putri Daeli, Ora Plane Maria Raihan Santoso, Nesti Anggraini University of Raharja Dept. of Informatics Engineering Tangerang Indonesia University of Raharja Dept. of Information System Tangerang Indonesia University of Raharja Dept. of Digital Business Tangerang Indonesia University of Raharja Dept. of Computer System Tangerang Indonesia
Financial fraud poses a significant challenge to the financial industry, with increasing complexity and scale threatening global economic stability. This paper explores the use of Big Data Analytics for proactive dete... 详细信息
来源: 评论
Explainability Approach-Based Series Arc Fault detection Method for Photovoltaic Systems
收藏 引用
IEEE ACCESS 2024年 12卷 45530-45542页
作者: Wang, Yao Zhou, Jiawang Paul, Kamal Chandra Zhao, Tiefu Sheng, Dejie Hebei Univ Technol Sch Elect Engn Tianjin 300400 Peoples R China Hebei Univ Technol State Key Lab Reliabil & Intelligence Elect Equipm Tianjin 300132 Peoples R China Univ North Carolina Charlotte Dept Elect & Comp Engn Charlotte NC 28223 USA
Arc fault detection devices are mandatory worldwide for mitigating DC series arc faults in photovoltaic systems. However, they are prone to nuisance tripping. Artificial intelligence-based approaches can be a solution... 详细信息
来源: 评论
Physics-Aware Watermarking Embedded in Unknown Input Observers for False Data Injection Attack detection in Cyber-Physical Microgrids
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 7824-7840页
作者: Liu, Mengxiang Zhang, Xin Zhu, Hengye Zhang, Zhenyong Deng, Ruilong Univ Sheffield Dept Automat Control & Syst Engn Sheffield S10 2TN England Zhejiang Univ State Key Lab Ind Control Technol Hangzhou 310027 Peoples R China Zhejiang Univ Coll Control Sci & Engn Hangzhou 310027 Peoples R China
The physics-aware watermarking-based detection method has shown great potential in detecting stealthy False Data Injection Attacks (FDIAs) by adding appropriate watermarks to control commands or sensor measurements, e... 详细信息
来源: 评论
TL-LEDarcNet: Transfer Learning Method for Low-Energy Series DC Arc-Fault detection in Photovoltaic Systems
收藏 引用
IEEE ACCESS 2022年 10卷 100725-100735页
作者: Sung, Yoondong Yoon, Gihwan Bae, Ji-Hoon Chae, Suyong Korea Inst Energy Res KIER Dept Energy ICT Convergence Res Daejeon 34129 South Korea Daegu Catholic Univ DCU Dept AI & Big Data Engn Gyongsan 38430 South Korea Pohang Univ Sci & Technol POSTECH Dept Elect Engn Pohang 37673 South Korea
The arc-fault phenomenon in photovoltaic (PV) systems has emerged as a major problem in recent years. Existing studies on arc-fault detection in conventional PV systems primarily focus on detecting typical stable arc-... 详细信息
来源: 评论