- document
-
Nowroozi, Ehsan (author), Mohammadi, Mohammadreza (author), Savas, Erkay (author), Mekdad, Yassine (author), Conti, M. (author)In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications,...journal article 2023
- document
-
Chen, Junwen (author), Liu, Zhigang (author), Wang, H. (author), Nunez, Alfredo (author), Han, Zhiwei (author)The excitation and vibration triggered by the long-term operation of railway vehicles inevitably result in defective states of catenary support devices. With the massive construction of high-speed electrified railways, automatic defect detection of diverse and plentiful fasteners on the catenary support device is of great significance for...journal article 2018