Статті в журналах з теми "User activity detection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "User activity detection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Zhu, Hao, and Georgios B. Giannakis. "Exploiting Sparse User Activity in Multiuser Detection." IEEE Transactions on Communications 59, no. 2 (February 2011): 454–65. http://dx.doi.org/10.1109/tcomm.2011.121410.090570.
Повний текст джерелаMitra, U., and H. V. Poor. "Activity detection in a multi-user environment." Wireless Personal Communications 3, no. 1-2 (1996): 149–74. http://dx.doi.org/10.1007/bf00333928.
Повний текст джерелаLee, Junho, and Seung-Hwan Lee. "Low dimensional multiuser detection exploiting low user activity." Journal of Communications and Networks 15, no. 3 (June 2013): 283–91. http://dx.doi.org/10.1109/jcn.2013.000051.
Повний текст джерелаZou, Shihong, Huizhong Sun, Guosheng Xu, and Ruijie Quan. "Ensemble Strategy for Insider Threat Detection from User Activity Logs." Computers, Materials & Continua 65, no. 2 (2020): 1321–34. http://dx.doi.org/10.32604/cmc.2020.09649.
Повний текст джерелаWang, Shuwen, Xingquan Zhu, Weiping Ding, and Amir Alipour Yengejeh. "Cyberbullying and Cyberviolence Detection: A Triangular User-Activity-Content View." IEEE/CAA Journal of Automatica Sinica 9, no. 8 (August 2022): 1384–405. http://dx.doi.org/10.1109/jas.2022.105740.
Повний текст джерелаPark, Hansol, Kookjin Kim, Dongil Shin, and Dongkyoo Shin. "BGP Dataset-Based Malicious User Activity Detection Using Machine Learning." Information 14, no. 9 (September 13, 2023): 501. http://dx.doi.org/10.3390/info14090501.
Повний текст джерелаParwez, Md Salik, Danda B. Rawat, and Moses Garuba. "Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network." IEEE Transactions on Industrial Informatics 13, no. 4 (August 2017): 2058–65. http://dx.doi.org/10.1109/tii.2017.2650206.
Повний текст джерелаPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data." Future Internet 14, no. 2 (February 21, 2022): 67. http://dx.doi.org/10.3390/fi14020067.
Повний текст джерелаBashir, Sulaimon Adebayo, Andrei Petrovski, and Daniel Doolan. "A framework for unsupervised change detection in activity recognition." International Journal of Pervasive Computing and Communications 13, no. 2 (June 5, 2017): 157–75. http://dx.doi.org/10.1108/ijpcc-03-2017-0027.
Повний текст джерелаKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (September 25, 2019): 4018. http://dx.doi.org/10.3390/app9194018.
Повний текст джерелаWei, Chao, Huaping Liu, Zaichen Zhang, Jian Dang, and Liang Wu. "Approximate Message Passing-Based Joint User Activity and Data Detection for NOMA." IEEE Communications Letters 21, no. 3 (March 2017): 640–43. http://dx.doi.org/10.1109/lcomm.2016.2624297.
Повний текст джерелаHan, Gang Tao, Ying Qiang Ding, Xiao Min Mu, and Jian Kang Zhang. "A Modified Energy Detection Algorithm Based on Primary User Activity for Cognitive Radio Networks." Applied Mechanics and Materials 548-549 (April 2014): 1351–54. http://dx.doi.org/10.4028/www.scientific.net/amm.548-549.1351.
Повний текст джерелаPark, Soojin, Sungyong Park, and Kyeongwook Ma. "An Automatic User Activity Analysis Method for Discovering Latent Requirements: Usability Issue Detection on Mobile Applications." Sensors 18, no. 9 (September 5, 2018): 2963. http://dx.doi.org/10.3390/s18092963.
Повний текст джерелаBenova, Lenka, and Ladislav Hudec. "Comprehensive Analysis and Evaluation of Anomalous User Activity in Web Server Logs." Sensors 24, no. 3 (January 24, 2024): 746. http://dx.doi.org/10.3390/s24030746.
Повний текст джерелаTruong-Allié, Camille, Alexis Paljic, Alexis Roux, and Martin Herbeth. "User Behavior Adaptive AR Guidance for Wayfinding and Tasks Completion." Multimodal Technologies and Interaction 5, no. 11 (October 20, 2021): 65. http://dx.doi.org/10.3390/mti5110065.
Повний текст джерелаLi, Jing, Yabo Dong, Shengkai Fang, Haowen Zhang, and Duanqing Xu. "User Context Detection for Relay Attack Resistance in Passive Keyless Entry and Start System." Sensors 20, no. 16 (August 9, 2020): 4446. http://dx.doi.org/10.3390/s20164446.
Повний текст джерелаDziurakh, Yurii, Ihor Kulyniak, Hanna Sarkisian, Ivan Zhygalo, Bohdan Chepil, and Khrystyna Vaskovych. "Intrusion Detection Systems for Smart Tourism Platforms: Safeguarding Food Safety and User Privacy." Journal of Internet Services and Information Security 14, no. 4 (November 30, 2024): 484–98. https://doi.org/10.58346/jisis.2024.i4.030.
Повний текст джерелаTsien, Yu Lei, and Rong Li Gai. "User Activity Based Application-Layer DoS/DDoS Attack Defense Algorithm." Applied Mechanics and Materials 742 (March 2015): 693–97. http://dx.doi.org/10.4028/www.scientific.net/amm.742.693.
Повний текст джерелаLi, Bo, Jianping Zheng, and Yaoxin Gao. "Compressed Sensing Based Multiuser Detection of Grant-Free NOMA With Dynamic User Activity." IEEE Communications Letters 26, no. 1 (January 2022): 143–47. http://dx.doi.org/10.1109/lcomm.2021.3124608.
Повний текст джерелаWitte, Tim Niklas. "Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity." IEEE Access 8 (2020): 164428–52. http://dx.doi.org/10.1109/access.2020.3021743.
Повний текст джерелаHe, Qi, Zhi Chen, Tony Q. S. Quek, Jinho Choi, and Shaoqian Li. "Compressive Channel Estimation and User Activity Detection in Distributed-Input Distributed-Output Systems." IEEE Communications Letters 22, no. 9 (September 2018): 1850–53. http://dx.doi.org/10.1109/lcomm.2018.2858241.
Повний текст джерелаZhang, Jun, Yongping Pan, and Jie Xu. "Compressive Sensing for Joint User Activity and Data Detection in Grant-Free NOMA." IEEE Wireless Communications Letters 8, no. 3 (June 2019): 857–60. http://dx.doi.org/10.1109/lwc.2019.2897552.
Повний текст джерелаLehmann, Frederic. "Joint User Activity Detection, Channel Estimation, and Decoding for Multiuser/Multiantenna OFDM Systems." IEEE Transactions on Vehicular Technology 67, no. 9 (September 2018): 8263–75. http://dx.doi.org/10.1109/tvt.2018.2841190.
Повний текст джерелаUtkovski, Zoran, Osvaldo Simeone, Tamara Dimitrova, and Petar Popovski. "Random Access in C-RAN for User Activity Detection With Limited-Capacity Fronthaul." IEEE Signal Processing Letters 24, no. 1 (January 2017): 17–21. http://dx.doi.org/10.1109/lsp.2016.2633962.
Повний текст джерелаAl-Kassawneh, Muna, Zubi Sadiq, and Sana Jahanshahi-Anbuhi. "User-friendly and ultra-stable all-inclusive gold tablets for cysteamine detection." RSC Advances 13, no. 28 (2023): 19638–50. http://dx.doi.org/10.1039/d3ra03073c.
Повний текст джерелаEsmaeili Kelishomi, Aghil, A. H. S. Garmabaki, Mahdi Bahaghighat, and Jianmin Dong. "Mobile User Indoor-Outdoor Detection Through Physical Daily Activities." Sensors 19, no. 3 (January 26, 2019): 511. http://dx.doi.org/10.3390/s19030511.
Повний текст джерелаBhoge, Rutuja K., Snehal A. Nagare, Swapanali P. Mahajan, and Prajakta S. Kor. "Depression Detection by Analyzing Social Media Post of User." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2720–24. http://dx.doi.org/10.22214/ijraset.2022.41874.
Повний текст джерелаNikonowicz, Jakub, Aamir Mahmood, and Mikael Gidlund. "A Blind Signal Samples Detection Algorithm for Accurate Primary User Traffic Estimation." Sensors 20, no. 15 (July 25, 2020): 4136. http://dx.doi.org/10.3390/s20154136.
Повний текст джерелаZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Повний текст джерелаHuang, Nai-Hsuan, and Tzi-Dar Chiueh. "Sequence Design and User Activity Detection for Uplink Grant-Free NOMA in mMTC Networks." IEEE Open Journal of the Communications Society 2 (2021): 384–95. http://dx.doi.org/10.1109/ojcoms.2021.3056994.
Повний текст джерелаGnanasekar, A. "Detecting Spam Bots on Social Network." Revista Gestão Inovação e Tecnologias 11, no. 2 (June 5, 2021): 850–60. http://dx.doi.org/10.47059/revistageintec.v11i2.1719.
Повний текст джерелаChiossi, Francesco, Robin Welsch, Steeven Villa, Lewis Chuang, and Sven Mayer. "Virtual Reality Adaptation Using Electrodermal Activity to Support the User Experience." Big Data and Cognitive Computing 6, no. 2 (May 13, 2022): 55. http://dx.doi.org/10.3390/bdcc6020055.
Повний текст джерелаZabielski, Michał, Zbigniew Tarapata, and Rafał Kasprzyk. "Adaptive method of similarity detection of user profiles on online social networks." Bulletin of the Military University of Technology 68, no. 2 (June 28, 2019): 43–57. http://dx.doi.org/10.5604/01.3001.0013.3002.
Повний текст джерелаPriyatno, Arif Mudi. "SPAMMER DETECTION BASED ON ACCOUNT, TWEET, AND COMMUNITY ACTIVITY ON TWITTER." Jurnal Ilmu Komputer dan Informasi 13, no. 2 (July 1, 2020): 97–107. http://dx.doi.org/10.21609/jiki.v13i2.871.
Повний текст джерелаKamble, Kunal, Pranit Jadhav, Atharva Shanware, and Pallavi Chitte. "Smart Surveillance System for Anomaly Recognition." ITM Web of Conferences 44 (2022): 02003. http://dx.doi.org/10.1051/itmconf/20224402003.
Повний текст джерелаS, Shalini. "Behavioral Based Credit Card Fraud Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 31, 2021): 3556–61. http://dx.doi.org/10.22214/ijraset.2021.37134.
Повний текст джерелаZhang, Wei, Jiahui Li, Xiujun Zhang, and Shidong Zhou. "A Joint User Activity Detection and Channel Estimation Scheme for Packet-Asynchronous Grant-Free Access." IEEE Wireless Communications Letters 11, no. 2 (February 2022): 338–42. http://dx.doi.org/10.1109/lwc.2021.3127680.
Повний текст джерелаKim, Youngho, Tae Oh, and Jeongnyeo Kim. "Analyzing User Awareness of Privacy Data Leak in Mobile Applications." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/369489.
Повний текст джерелаTrisno, Syahrul Nugraha, Achmad Ubaidillah, and Kunto Aji Wibisono. "SMART TROLLY DESIGN BASED ON MARKER DETECTION." MULTITEK INDONESIA 15, no. 1 (October 4, 2021): 43–53. http://dx.doi.org/10.24269/mtkind.v15i1.2429.
Повний текст джерелаZheng, Panpan, Shuhan Yuan, and Xintao Wu. "SAFE: A Neural Survival Analysis Model for Fraud Early Detection." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1278–85. http://dx.doi.org/10.1609/aaai.v33i01.33011278.
Повний текст джерелаNatadimadja, Muhammad Rayhan, Maman Abdurohman, and Hilal Hudan Nuha. "A Survey on Phishing Website Detection Using Hadoop." Jurnal Informatika Universitas Pamulang 5, no. 3 (September 30, 2020): 237. http://dx.doi.org/10.32493/informatika.v5i3.6672.
Повний текст джерелаAndo, Bruno, Salvatore Baglio, Salvatore Castorina, Ruben Crispino, and Vincenzo Marletta. "An Assistive Technology Solution for User Activity Monitoring Exploiting Passive RFID." Sensors 20, no. 17 (September 1, 2020): 4954. http://dx.doi.org/10.3390/s20174954.
Повний текст джерелаSharanya S, Sridhar PA, Suresh MP, Poorana Mary Monisha W, and Tharadevi R. "Development of Graphical User Interface to Classify Cardiac Abnormalities using ECG Signal." International Journal of Research in Pharmaceutical Sciences 10, no. 3 (July 12, 2019): 1621–25. http://dx.doi.org/10.26452/ijrps.v10i3.1326.
Повний текст джерелаRoy, Avirup, Hrishikesh Dutta, Amit Kumar Bhuyan, and Subir Biswas. "On-Device Semi-Supervised Activity Detection: A New Privacy-Aware Personalized Health Monitoring Approach." Sensors 24, no. 14 (July 9, 2024): 4444. http://dx.doi.org/10.3390/s24144444.
Повний текст джерелаEerdekens, Anniek, Margot Deruyck, Jaron Fontaine, Bert Damiaans, Luc Martens, Eli De Poorter, Jan Govaere, David Plets, and Wout Joseph. "Horse Jumping and Dressage Training Activity Detection Using Accelerometer Data." Animals 11, no. 10 (October 7, 2021): 2904. http://dx.doi.org/10.3390/ani11102904.
Повний текст джерелаChen, Shuo, Haojie Li, Lanjie Zhang, Mingyu Zhou, and Xuehua Li. "Block Sparse Bayesian Learning Based Joint User Activity Detection and Channel Estimation in Grant-Free MIMO-NOMA." Drones 7, no. 1 (December 31, 2022): 27. http://dx.doi.org/10.3390/drones7010027.
Повний текст джерелаRamirez, Heilym, Sergio A. Velastin, Paulo Aguayo, Ernesto Fabregas, and Gonzalo Farias. "Human Activity Recognition by Sequences of Skeleton Features." Sensors 22, no. 11 (May 25, 2022): 3991. http://dx.doi.org/10.3390/s22113991.
Повний текст джерелаEt.al, D. Priyadarshini. "A Novel Technique for IDS in Distributed Data Environment Using Merkel Based Security Mechanism for Secure User Allocation." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 4284–97. http://dx.doi.org/10.17762/turcomat.v12i3.1720.
Повний текст джерелаThorat, Sankalp, Riyesh Rahate, Das Paramjeet Singh, and Ganesh Shinde. "Keylogger Deployment and Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 4557–60. http://dx.doi.org/10.22214/ijraset.2023.51006.
Повний текст джерелаYakovyna, Vitalii, and Bohdan Uhrynovskyi. "User-perceived Response Metrics in Android OS for Software Aging Detection." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 9 (June 10, 2021): 32–43. http://dx.doi.org/10.23939/sisn2021.09.032.
Повний текст джерела