networking Intrusion Detection Systems (NIDS) are essential for identifying and mitigating cyberthreats in modern networking infrastructures. Modern NIDS still struggle with scalability, data imbalance, and high false...
详细信息
Virtual characters are controlled by artificial intelligence in video games and movies. Controlling these characters when they are surrounded by people is known as crowd simulation. In this work, we propose to employ ...
详细信息
This research study addresses the increasing need for automated traffic enforcement solutions to improve road safety, focusing on helmet detection and license plate recognition for motorcyclists. With manual enforceme...
详细信息
The topic of cybersecurity remains a significant concern for industries involved in digital operations, as seen by the recurring increase in security incidents. The increasing use of Internet of Things (IoT) devices i...
详细信息
Autonomous robotic cars' rapid, accurate, and efficient product handling and navigation are changing warehouse inventory management. These 24/7 smart vehicles save labor costs, human error, and operational ineffic...
详细信息
End-to-end text spotting is a vital computer vision task that aims to integrate scene text detection and recognition into a unified *** methods heavily rely on region-of-interest(Rol)operations to extract local featur...
详细信息
End-to-end text spotting is a vital computer vision task that aims to integrate scene text detection and recognition into a unified *** methods heavily rely on region-of-interest(Rol)operations to extract local features and complex post-processing steps to produce final *** address these limitations,we propose TextFormer,a query-based end-to-end text spotter with a transformer ***,using query embedding per text instance,TextFormer builds upon an image encoder and a text decoder to learn a joint semantic understanding for multitask *** allows for mutual training and optimization of classification,segmentation and recognition branches,resulting in deeper feature sharing without sacrificing flexibility or ***,we design an adaptive global aggregation(AGG)module to transfer global features into sequential features for reading arbitrarilyshaped texts,which overcomes the suboptimization problem of Rol ***,potential corpus information is utilized from weak annotations to full labels through mixed supervision,further improving text detection and end-to-end text spotting *** experiments on various bilingual(i.e.,English and Chinese)benchmarks demonstrate the superiority of our *** on the TDA-ReCTS dataset,TextFormer surpasses the state-of-the-art method in terms of 1-NED by 13.2%.
Fire incidents pose significant risks to life and property, necessitating the development of advanced fire detection and suppression systems. This paper presents an innovative approach that combines a Convolutional Ne...
详细信息
Cybersecurity threats, especially phishing attacks, continue to pose a significant risk to internet users. In response to this growing menace, we present "PhishShield,"a robust and scalable solution that lev...
详细信息
With rising demand for energy efficiency and sustainability, advanced technologies to optimize energy consumption in various domains are in high demand. This paper proposes an Edge-based Smart Energy Management System...
详细信息
Phishing is the act of attackers sending malicious emails to receivers in an effort to trick them into falling for a con. Normally, the intention is to persuade users to provide private information, such as system log...
详细信息
ISBN:
(纸本)9783031689048
Phishing is the act of attackers sending malicious emails to receivers in an effort to trick them into falling for a con. Normally, the intention is to persuade users to provide private information, such as system logins or financial data. Our project investigates such email phishing attacks using AI and ML to get a reasonable conclusion about which algorithm can spot these attacks the most successfully. In terms of cybersecurity, a phishing attack is a cybercrime that aims to obtain a user’s personal information in order to carry out some destructive actions. This attack’s effects could lead to account takeover, privilege escalation, and other issues. And in order to lessen it, this study provides information on how to spot phishing emails so that businesses can correctly deal with them. Natural Language Processing (NLP) [26], logistic regression, and fundamental AI ideas like CNN [27] are used, along with machine learning algorithms like KNN, Naive Bayers, and these. This study aims to identify the optimal machine learning algorithm that would provide the highest level of accuracy when it comes to phishing email detection. "To improve the accuracy of detecting phishing emails we have implemented CNN which is an effective approach to fulfill the target. CNN [27] can learn to recognize tiny patterns and traits that may be challenging for humans to notice, they can be a great tool for detecting phishing emails. Handling this technique is very important, hence LSTM is introduced". The CNN model’s LSTM [27] can be thought of as its brain. LSTM (Long Short-Term Memory) [27] is a form of recurrent neural network (RNN) that is frequently employed in tasks involving sequence prediction and natural language processing (NLP) [26]. It is intended to solve the vanishing gradients issue, which can arise in conventional RNNs when the gradients are extremely small and make the network struggle to learn long-term dependencies. By understanding and executing everything we have obse
暂无评论