Unveiling Malware Patterns: A Self-analysis Perspective Authors: Fangtian Zhong, Qin Hu, Yili Jiang, Jiaqi Huang, Xiuzhen Cheng | Published: 2025-01-10 Malware ClassificationBasic Block AnalysisImage Feature Extraction 2025.01.10 2025.05.27 Literature Database
SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman | Published: 2024-05-17 WatermarkingImage Feature ExtractionAgricultural Data Privacy 2024.05.17 2025.05.27 Literature Database
Effects of Real-Life Traffic Sign Alteration on YOLOv7- an Object Recognition Model Authors: Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun | Published: 2023-05-09 | Updated: 2024-01-29 Real-Time InferenceFeature Extraction MethodImage Feature Extraction 2023.05.09 2025.05.28 Literature Database
Diffusion Denoising Process for Perceptron Bias in Out-of-distribution Detection Authors: Luping Liu, Yi Ren, Xize Cheng, Rongjie Huang, Chongxuan Li, Zhou Zhao | Published: 2022-11-21 | Updated: 2023-06-04 BiasOptimization MethodsImage Feature Extraction 2022.11.21 2025.05.28 Literature Database
Data-Adaptive Discriminative Feature Localization with Statistically Guaranteed Interpretation Authors: Ben Dai, Xiaotong Shen, Lin Yee Chen, Chunlin Li, Wei Pan | Published: 2022-11-18 Optimization MethodsImage Feature ExtractionStatistical Testing 2022.11.18 2025.05.28 Literature Database
Adversarial attacks on an optical neural network Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29 Cyber ThreatAttack TypeImage Feature Extraction 2022.04.29 2025.05.28 Literature Database
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment Authors: Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan | Published: 2022-04-04 Dynamic Analysis MethodMachine LearningImage Feature Extraction 2022.04.04 2025.05.28 Literature Database
Convolutional Neural Networks for Image Spam Detection Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02 Model ArchitectureMachine LearningImage Feature Extraction 2022.04.02 2025.05.28 Literature Database
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications Authors: Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota | Published: 2022-01-26 | Updated: 2022-04-16 Privacy Enhancing ProtocolCryptographic ProtocolImage Feature Extraction 2022.01.26 2025.05.28 Literature Database
CNN vs ELM for Image-Based Malware Classification Authors: Mugdha Jain, William Andreopoulos, Mark Stamp | Published: 2021-03-24 PE Malware ClassificationOptimization MethodsImage Feature Extraction 2021.03.24 2025.05.28 Literature Database