New API capabilities and AI-powered Threat Encyclopedia eliminate manual audit preparation, providing real-time compliance evidence and instant threat intelligence Quttera today announced major ...
Visualization examples of YOLOv10-N/S, YOLO11-N/S, YOLOv12-N/S, and YOLOv13-N/S. Representative visualization examples of adaptive hyperedges. The hyperedges in the first and second columns mainly ...
Thank you for your excellent work on "MDCFVit-YOLO: A model for nighttime infrared small target vehicle and pedestrian detection." I am very interested in reproducing your results and applying your ...
Researchers at Google’s Threat Intelligence Group (GTIG) have discovered that hackers are creating malware that can harness the power of large language models (LLMs) to rewrite itself on the fly. An ...
With the rapid development of marine resource exploitation and the increasing demand for underwater robot inspection, achieving reliable target perception in turbid, low-illumination, and spectrally ...
Security researchers at Barracuda Networks have discovered two novel QR code phishing (quishing) techniques involving splitting malicious QR codes into two parts or embedding them into legitimate ones ...
To address the issues of missed detection and false detection during the defect inspection process of the PCB, an improved YOLOv7-based algorithm for PCB defect detection is proposed. Firstly, the ...
Abstract: Accurate and efficient small object detection using multimodal remote sensing images on resource-constrained aerial platforms is a challenging task. Most existing solutions rely on complex ...
Imagine handing over the reins of your workflow to an AI that operates independently, making decisions and executing tasks without waiting for your input. Sounds futuristic, doesn’t it? That’s exactly ...
Abstract: Object detection in autonomous driving scenarios represents a significant research direction within artificial intelligence. Real-time and accurate object detection and recognition are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results