Journal articles on the topic 'User activity detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'User activity detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhu, Hao, and Georgios B. Giannakis. "Exploiting Sparse User Activity in Multiuser Detection." IEEE Transactions on Communications 59, no. 2 (February 2011): 454–65. http://dx.doi.org/10.1109/tcomm.2011.121410.090570.
Full textMitra, U., and H. V. Poor. "Activity detection in a multi-user environment." Wireless Personal Communications 3, no. 1-2 (1996): 149–74. http://dx.doi.org/10.1007/bf00333928.
Full textLee, Junho, and Seung-Hwan Lee. "Low dimensional multiuser detection exploiting low user activity." Journal of Communications and Networks 15, no. 3 (June 2013): 283–91. http://dx.doi.org/10.1109/jcn.2013.000051.
Full textZou, Shihong, Huizhong Sun, Guosheng Xu, and Ruijie Quan. "Ensemble Strategy for Insider Threat Detection from User Activity Logs." Computers, Materials & Continua 65, no. 2 (2020): 1321–34. http://dx.doi.org/10.32604/cmc.2020.09649.
Full textWang, Shuwen, Xingquan Zhu, Weiping Ding, and Amir Alipour Yengejeh. "Cyberbullying and Cyberviolence Detection: A Triangular User-Activity-Content View." IEEE/CAA Journal of Automatica Sinica 9, no. 8 (August 2022): 1384–405. http://dx.doi.org/10.1109/jas.2022.105740.
Full textPark, Hansol, Kookjin Kim, Dongil Shin, and Dongkyoo Shin. "BGP Dataset-Based Malicious User Activity Detection Using Machine Learning." Information 14, no. 9 (September 13, 2023): 501. http://dx.doi.org/10.3390/info14090501.
Full textParwez, Md Salik, Danda B. Rawat, and Moses Garuba. "Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network." IEEE Transactions on Industrial Informatics 13, no. 4 (August 2017): 2058–65. http://dx.doi.org/10.1109/tii.2017.2650206.
Full textPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data." Future Internet 14, no. 2 (February 21, 2022): 67. http://dx.doi.org/10.3390/fi14020067.
Full textBashir, Sulaimon Adebayo, Andrei Petrovski, and Daniel Doolan. "A framework for unsupervised change detection in activity recognition." International Journal of Pervasive Computing and Communications 13, no. 2 (June 5, 2017): 157–75. http://dx.doi.org/10.1108/ijpcc-03-2017-0027.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (September 25, 2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textWei, Chao, Huaping Liu, Zaichen Zhang, Jian Dang, and Liang Wu. "Approximate Message Passing-Based Joint User Activity and Data Detection for NOMA." IEEE Communications Letters 21, no. 3 (March 2017): 640–43. http://dx.doi.org/10.1109/lcomm.2016.2624297.
Full textHan, Gang Tao, Ying Qiang Ding, Xiao Min Mu, and Jian Kang Zhang. "A Modified Energy Detection Algorithm Based on Primary User Activity for Cognitive Radio Networks." Applied Mechanics and Materials 548-549 (April 2014): 1351–54. http://dx.doi.org/10.4028/www.scientific.net/amm.548-549.1351.
Full textPark, Soojin, Sungyong Park, and Kyeongwook Ma. "An Automatic User Activity Analysis Method for Discovering Latent Requirements: Usability Issue Detection on Mobile Applications." Sensors 18, no. 9 (September 5, 2018): 2963. http://dx.doi.org/10.3390/s18092963.
Full textBenova, Lenka, and Ladislav Hudec. "Comprehensive Analysis and Evaluation of Anomalous User Activity in Web Server Logs." Sensors 24, no. 3 (January 24, 2024): 746. http://dx.doi.org/10.3390/s24030746.
Full textTruong-Allié, Camille, Alexis Paljic, Alexis Roux, and Martin Herbeth. "User Behavior Adaptive AR Guidance for Wayfinding and Tasks Completion." Multimodal Technologies and Interaction 5, no. 11 (October 20, 2021): 65. http://dx.doi.org/10.3390/mti5110065.
Full textLi, Jing, Yabo Dong, Shengkai Fang, Haowen Zhang, and Duanqing Xu. "User Context Detection for Relay Attack Resistance in Passive Keyless Entry and Start System." Sensors 20, no. 16 (August 9, 2020): 4446. http://dx.doi.org/10.3390/s20164446.
Full textDziurakh, Yurii, Ihor Kulyniak, Hanna Sarkisian, Ivan Zhygalo, Bohdan Chepil, and Khrystyna Vaskovych. "Intrusion Detection Systems for Smart Tourism Platforms: Safeguarding Food Safety and User Privacy." Journal of Internet Services and Information Security 14, no. 4 (November 30, 2024): 484–98. https://doi.org/10.58346/jisis.2024.i4.030.
Full textTsien, Yu Lei, and Rong Li Gai. "User Activity Based Application-Layer DoS/DDoS Attack Defense Algorithm." Applied Mechanics and Materials 742 (March 2015): 693–97. http://dx.doi.org/10.4028/www.scientific.net/amm.742.693.
Full textLi, Bo, Jianping Zheng, and Yaoxin Gao. "Compressed Sensing Based Multiuser Detection of Grant-Free NOMA With Dynamic User Activity." IEEE Communications Letters 26, no. 1 (January 2022): 143–47. http://dx.doi.org/10.1109/lcomm.2021.3124608.
Full textWitte, Tim Niklas. "Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity." IEEE Access 8 (2020): 164428–52. http://dx.doi.org/10.1109/access.2020.3021743.
Full textHe, Qi, Zhi Chen, Tony Q. S. Quek, Jinho Choi, and Shaoqian Li. "Compressive Channel Estimation and User Activity Detection in Distributed-Input Distributed-Output Systems." IEEE Communications Letters 22, no. 9 (September 2018): 1850–53. http://dx.doi.org/10.1109/lcomm.2018.2858241.
Full textZhang, Jun, Yongping Pan, and Jie Xu. "Compressive Sensing for Joint User Activity and Data Detection in Grant-Free NOMA." IEEE Wireless Communications Letters 8, no. 3 (June 2019): 857–60. http://dx.doi.org/10.1109/lwc.2019.2897552.
Full textLehmann, Frederic. "Joint User Activity Detection, Channel Estimation, and Decoding for Multiuser/Multiantenna OFDM Systems." IEEE Transactions on Vehicular Technology 67, no. 9 (September 2018): 8263–75. http://dx.doi.org/10.1109/tvt.2018.2841190.
Full textUtkovski, Zoran, Osvaldo Simeone, Tamara Dimitrova, and Petar Popovski. "Random Access in C-RAN for User Activity Detection With Limited-Capacity Fronthaul." IEEE Signal Processing Letters 24, no. 1 (January 2017): 17–21. http://dx.doi.org/10.1109/lsp.2016.2633962.
Full textAl-Kassawneh, Muna, Zubi Sadiq, and Sana Jahanshahi-Anbuhi. "User-friendly and ultra-stable all-inclusive gold tablets for cysteamine detection." RSC Advances 13, no. 28 (2023): 19638–50. http://dx.doi.org/10.1039/d3ra03073c.
Full textEsmaeili Kelishomi, Aghil, A. H. S. Garmabaki, Mahdi Bahaghighat, and Jianmin Dong. "Mobile User Indoor-Outdoor Detection Through Physical Daily Activities." Sensors 19, no. 3 (January 26, 2019): 511. http://dx.doi.org/10.3390/s19030511.
Full textBhoge, Rutuja K., Snehal A. Nagare, Swapanali P. Mahajan, and Prajakta S. Kor. "Depression Detection by Analyzing Social Media Post of User." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2720–24. http://dx.doi.org/10.22214/ijraset.2022.41874.
Full textNikonowicz, Jakub, Aamir Mahmood, and Mikael Gidlund. "A Blind Signal Samples Detection Algorithm for Accurate Primary User Traffic Estimation." Sensors 20, no. 15 (July 25, 2020): 4136. http://dx.doi.org/10.3390/s20154136.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textHuang, Nai-Hsuan, and Tzi-Dar Chiueh. "Sequence Design and User Activity Detection for Uplink Grant-Free NOMA in mMTC Networks." IEEE Open Journal of the Communications Society 2 (2021): 384–95. http://dx.doi.org/10.1109/ojcoms.2021.3056994.
Full textGnanasekar, A. "Detecting Spam Bots on Social Network." Revista Gestão Inovação e Tecnologias 11, no. 2 (June 5, 2021): 850–60. http://dx.doi.org/10.47059/revistageintec.v11i2.1719.
Full textChiossi, Francesco, Robin Welsch, Steeven Villa, Lewis Chuang, and Sven Mayer. "Virtual Reality Adaptation Using Electrodermal Activity to Support the User Experience." Big Data and Cognitive Computing 6, no. 2 (May 13, 2022): 55. http://dx.doi.org/10.3390/bdcc6020055.
Full textZabielski, Michał, Zbigniew Tarapata, and Rafał Kasprzyk. "Adaptive method of similarity detection of user profiles on online social networks." Bulletin of the Military University of Technology 68, no. 2 (June 28, 2019): 43–57. http://dx.doi.org/10.5604/01.3001.0013.3002.
Full textPriyatno, Arif Mudi. "SPAMMER DETECTION BASED ON ACCOUNT, TWEET, AND COMMUNITY ACTIVITY ON TWITTER." Jurnal Ilmu Komputer dan Informasi 13, no. 2 (July 1, 2020): 97–107. http://dx.doi.org/10.21609/jiki.v13i2.871.
Full textKamble, Kunal, Pranit Jadhav, Atharva Shanware, and Pallavi Chitte. "Smart Surveillance System for Anomaly Recognition." ITM Web of Conferences 44 (2022): 02003. http://dx.doi.org/10.1051/itmconf/20224402003.
Full textS, Shalini. "Behavioral Based Credit Card Fraud Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 31, 2021): 3556–61. http://dx.doi.org/10.22214/ijraset.2021.37134.
Full textZhang, Wei, Jiahui Li, Xiujun Zhang, and Shidong Zhou. "A Joint User Activity Detection and Channel Estimation Scheme for Packet-Asynchronous Grant-Free Access." IEEE Wireless Communications Letters 11, no. 2 (February 2022): 338–42. http://dx.doi.org/10.1109/lwc.2021.3127680.
Full textKim, Youngho, Tae Oh, and Jeongnyeo Kim. "Analyzing User Awareness of Privacy Data Leak in Mobile Applications." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/369489.
Full textTrisno, Syahrul Nugraha, Achmad Ubaidillah, and Kunto Aji Wibisono. "SMART TROLLY DESIGN BASED ON MARKER DETECTION." MULTITEK INDONESIA 15, no. 1 (October 4, 2021): 43–53. http://dx.doi.org/10.24269/mtkind.v15i1.2429.
Full textZheng, Panpan, Shuhan Yuan, and Xintao Wu. "SAFE: A Neural Survival Analysis Model for Fraud Early Detection." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1278–85. http://dx.doi.org/10.1609/aaai.v33i01.33011278.
Full textNatadimadja, Muhammad Rayhan, Maman Abdurohman, and Hilal Hudan Nuha. "A Survey on Phishing Website Detection Using Hadoop." Jurnal Informatika Universitas Pamulang 5, no. 3 (September 30, 2020): 237. http://dx.doi.org/10.32493/informatika.v5i3.6672.
Full textAndo, Bruno, Salvatore Baglio, Salvatore Castorina, Ruben Crispino, and Vincenzo Marletta. "An Assistive Technology Solution for User Activity Monitoring Exploiting Passive RFID." Sensors 20, no. 17 (September 1, 2020): 4954. http://dx.doi.org/10.3390/s20174954.
Full textSharanya S, Sridhar PA, Suresh MP, Poorana Mary Monisha W, and Tharadevi R. "Development of Graphical User Interface to Classify Cardiac Abnormalities using ECG Signal." International Journal of Research in Pharmaceutical Sciences 10, no. 3 (July 12, 2019): 1621–25. http://dx.doi.org/10.26452/ijrps.v10i3.1326.
Full textRoy, Avirup, Hrishikesh Dutta, Amit Kumar Bhuyan, and Subir Biswas. "On-Device Semi-Supervised Activity Detection: A New Privacy-Aware Personalized Health Monitoring Approach." Sensors 24, no. 14 (July 9, 2024): 4444. http://dx.doi.org/10.3390/s24144444.
Full textEerdekens, Anniek, Margot Deruyck, Jaron Fontaine, Bert Damiaans, Luc Martens, Eli De Poorter, Jan Govaere, David Plets, and Wout Joseph. "Horse Jumping and Dressage Training Activity Detection Using Accelerometer Data." Animals 11, no. 10 (October 7, 2021): 2904. http://dx.doi.org/10.3390/ani11102904.
Full textChen, Shuo, Haojie Li, Lanjie Zhang, Mingyu Zhou, and Xuehua Li. "Block Sparse Bayesian Learning Based Joint User Activity Detection and Channel Estimation in Grant-Free MIMO-NOMA." Drones 7, no. 1 (December 31, 2022): 27. http://dx.doi.org/10.3390/drones7010027.
Full textRamirez, Heilym, Sergio A. Velastin, Paulo Aguayo, Ernesto Fabregas, and Gonzalo Farias. "Human Activity Recognition by Sequences of Skeleton Features." Sensors 22, no. 11 (May 25, 2022): 3991. http://dx.doi.org/10.3390/s22113991.
Full textEt.al, D. Priyadarshini. "A Novel Technique for IDS in Distributed Data Environment Using Merkel Based Security Mechanism for Secure User Allocation." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 4284–97. http://dx.doi.org/10.17762/turcomat.v12i3.1720.
Full textThorat, Sankalp, Riyesh Rahate, Das Paramjeet Singh, and Ganesh Shinde. "Keylogger Deployment and Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 4557–60. http://dx.doi.org/10.22214/ijraset.2023.51006.
Full textYakovyna, Vitalii, and Bohdan Uhrynovskyi. "User-perceived Response Metrics in Android OS for Software Aging Detection." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 9 (June 10, 2021): 32–43. http://dx.doi.org/10.23939/sisn2021.09.032.
Full text