{"id":"https://openalex.org/W3011750817","doi":"https://doi.org/10.1155/2020/3658795","title":"An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing","display_name":"An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing","publication_year":2020,"publication_date":"2020-03-10","ids":{"openalex":"https://openalex.org/W3011750817","doi":"https://doi.org/10.1155/2020/3658795","mag":"3011750817","pmid":"https://pubmed.ncbi.nlm.nih.gov/32300372"},"language":"en","primary_location":{"id":"doi:10.1155/2020/3658795","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/3658795","pdf_url":"https://downloads.hindawi.com/journals/cmmm/2020/3658795.pdf","source":{"id":"https://openalex.org/S36980176","display_name":"Computational and Mathematical Methods in Medicine","issn_l":"1748-670X","issn":["1748-670X","1748-6718"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational and Mathematical Methods in Medicine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/cmmm/2020/3658795.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100640053","display_name":"Xin Su","orcid":"https://orcid.org/0000-0002-1860-9004"},"institutions":[{"id":"https://openalex.org/I118612203","display_name":"Hunan Police Academy","ror":"https://ror.org/02gh10772","country_code":"CN","type":"education","lineage":["https://openalex.org/I118612203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Su","raw_affiliation_strings":["Big Data Intelligence Police Hunan Provincial Engineering Research Center, Hunan Police Academy, Changsha, China","Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Big Data Intelligence Police Hunan Provincial Engineering Research Center, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]},{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055163482","display_name":"Qingbo Gong","orcid":"https://orcid.org/0000-0001-8107-0817"},"institutions":[{"id":"https://openalex.org/I4210123196","display_name":"Zhejiang Environmental Monitoring Center","ror":"https://ror.org/02n2ntt72","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123196"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingbo Gong","raw_affiliation_strings":["Zhejiang Economic Information Center, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Economic Information Center, Hangzhou, China","institution_ids":["https://openalex.org/I4210123196"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100727848","display_name":"Yi Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210123196","display_name":"Zhejiang Environmental Monitoring Center","ror":"https://ror.org/02n2ntt72","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123196"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Zheng","raw_affiliation_strings":["Zhejiang Economic Information Center, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Economic Information Center, Hangzhou, China","institution_ids":["https://openalex.org/I4210123196"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087827258","display_name":"Xuchong Liu","orcid":"https://orcid.org/0000-0003-4788-079X"},"institutions":[{"id":"https://openalex.org/I118612203","display_name":"Hunan Police Academy","ror":"https://ror.org/02gh10772","country_code":"CN","type":"education","lineage":["https://openalex.org/I118612203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuchong Liu","raw_affiliation_strings":["Big Data Intelligence Police Hunan Provincial Engineering Research Center, Hunan Police Academy, Changsha, China","Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Big Data Intelligence Police Hunan Provincial Engineering Research Center, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]},{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063188437","display_name":"Kuan\u2010Ching Li","orcid":"https://orcid.org/0000-0003-1381-4364"},"institutions":[{"id":"https://openalex.org/I177918364","display_name":"Providence University","ror":"https://ror.org/03fcpsq87","country_code":"TW","type":"education","lineage":["https://openalex.org/I177918364"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kuan-Ching Li","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Providence University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Providence University, Taichung, Taiwan","institution_ids":["https://openalex.org/I177918364"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5087827258"],"corresponding_institution_ids":["https://openalex.org/I118612203"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.1524,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.40007852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8616085052490234},{"id":"https://openalex.org/keywords/interfacing","display_name":"Interfacing","score":0.7224107384681702},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7031059265136719},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6844842433929443},{"id":"https://openalex.org/keywords/humanoid-robot","display_name":"Humanoid robot","score":0.5395495295524597},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.4498459994792938},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4296696186065674},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.4262891709804535},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4016605615615845},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3709401488304138},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.29261860251426697},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.164936363697052}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8616085052490234},{"id":"https://openalex.org/C2776303644","wikidata":"https://www.wikidata.org/wiki/Q1020499","display_name":"Interfacing","level":2,"score":0.7224107384681702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7031059265136719},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6844842433929443},{"id":"https://openalex.org/C60692881","wikidata":"https://www.wikidata.org/wiki/Q584529","display_name":"Humanoid robot","level":3,"score":0.5395495295524597},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.4498459994792938},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4296696186065674},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.4262891709804535},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4016605615615845},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3709401488304138},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.29261860251426697},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.164936363697052},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.0}],"mesh":[{"descriptor_ui":"D000069550","descriptor_name":"Machine Learning","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000069550","descriptor_name":"Machine Learning","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000069550","descriptor_name":"Machine Learning","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D001519","descriptor_name":"Behavior","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D001519","descriptor_name":"Behavior","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D001519","descriptor_name":"Behavior","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true},{"descriptor_ui":"D019295","descriptor_name":"Computational Biology","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D019295","descriptor_name":"Computational Biology","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D019295","descriptor_name":"Computational Biology","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D062207","descriptor_name":"Brain-Computer Interfaces","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true},{"descriptor_ui":"D062207","descriptor_name":"Brain-Computer Interfaces","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true},{"descriptor_ui":"D062207","descriptor_name":"Brain-Computer Interfaces","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true},{"descriptor_ui":"D063731","descriptor_name":"Mobile Applications","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true},{"descriptor_ui":"D063731","descriptor_name":"Mobile Applications","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true},{"descriptor_ui":"D063731","descriptor_name":"Mobile Applications","qualifier_ui":"Q000706","qualifier_name":"statistics & numerical data","is_major_topic":true}],"locations_count":5,"locations":[{"id":"doi:10.1155/2020/3658795","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/3658795","pdf_url":"https://downloads.hindawi.com/journals/cmmm/2020/3658795.pdf","source":{"id":"https://openalex.org/S36980176","display_name":"Computational and Mathematical Methods in Medicine","issn_l":"1748-670X","issn":["1748-670X","1748-6718"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational and Mathematical Methods in Medicine","raw_type":"journal-article"},{"id":"pmid:32300372","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/32300372","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational and mathematical methods in medicine","raw_type":null},{"id":"pmh:oai:doaj.org/article:b21389ce73454dee8dc84d203eb3f0e7","is_oa":true,"landing_page_url":"https://doaj.org/article/b21389ce73454dee8dc84d203eb3f0e7","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computational and Mathematical Methods in Medicine, Vol 2020 (2020)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2020/3658795","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/3658795","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"},{"id":"pmh:oai:pubmedcentral.nih.gov:7085869","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/7085869","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Comput Math Methods Med","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1155/2020/3658795","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/3658795","pdf_url":"https://downloads.hindawi.com/journals/cmmm/2020/3658795.pdf","source":{"id":"https://openalex.org/S36980176","display_name":"Computational and Mathematical Methods in Medicine","issn_l":"1748-670X","issn":["1748-670X","1748-6718"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational and Mathematical Methods in Medicine","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320330206","display_name":"Science and Technology Program of Hunan Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3011750817.pdf","grobid_xml":"https://content.openalex.org/works/W3011750817.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1532142362","https://openalex.org/W2018316318","https://openalex.org/W2033616728","https://openalex.org/W2060692877","https://openalex.org/W2324464293","https://openalex.org/W2587429246","https://openalex.org/W2737104772","https://openalex.org/W2737578512","https://openalex.org/W2791900082","https://openalex.org/W2792310543","https://openalex.org/W2809965384"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W4327939473","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W3200508744","https://openalex.org/W2462192250","https://openalex.org/W4312234627","https://openalex.org/W3195312353"],"abstract_inverted_index":{"Recently,":[0],"brain-machine":[1,65],"interfacing":[2],"is":[3],"very":[4],"popular":[5],"that":[6],"link":[7],"humans":[8],"and":[9,35,58,80,104,121,141,153,183],"artificial":[10],"devices":[11],"through":[12],"brain":[13],"signals":[14],"which":[15,43,193],"lead":[16],"to":[17,55,74,84,101,110],"corresponding":[18],"mobile":[19],"application":[20,77],"as":[21,132,139],"supplementary.":[22],"The":[23,206],"Android":[24,49,76,82,94,98,106,117,158,180,184,212],"platform":[25,57],"has":[26],"developed":[27],"rapidly":[28],"because":[29],"of":[30,40,48,64,93,97,136,174,197,200,208,216],"its":[31],"good":[32],"user":[33],"experience":[34],"openness.":[36],"Meanwhile,":[37],"these":[38,143,217],"characteristics":[39,73,135,145,219],"this":[41,56,124],"platform,":[42],"cause":[44],"the":[45,91,105,167,195],"amazing":[46],"pace":[47],"malware,":[50],"pose":[51],"a":[52,128,190],"great":[53],"threat":[54],"data":[59,87],"correction":[60],"during":[61],"signal":[62,86],"transmission":[63],"interfacing.":[66],"Many":[67],"previous":[68],"works":[69],"employ":[70],"various":[71],"behavioral":[72,155,175],"analyze":[75],"(or":[78],"app)":[79],"detect":[81],"malware":[83,107,118,185,213],"protect":[85],"secure.":[88],"However,":[89],"with":[90,221],"development":[92],"app,":[95],"category":[96],"app":[99,138,159,181],"tends":[100,109],"be":[102,111],"diverse,":[103],"behavior":[108,134,144,201,218],"complex.":[112],"This":[113],"situation":[114],"makes":[115],"existing":[116],"detections":[119],"complicated":[120],"inefficient.":[122],"In":[123],"paper,":[125],"we":[126,150,165,169,177,188],"propose":[127],"broad":[129],"analysis,":[130],"gathering":[131],"many":[133],"an":[137,161],"possible":[140],"compare":[142,194],"in":[146,160,171,203],"several":[147],"metrics.":[148],"First,":[149],"extract":[151],"static":[152],"dynamic":[154],"characteristic":[156,176,202],"from":[157],"automatic":[162],"manner.":[163],"Second,":[164],"explain":[166],"decision":[168],"made":[170],"each":[172,198],"kind":[173,199],"choose":[178],"for":[179],"analysis":[182],"detection.":[186],"Third,":[187],"design":[189],"detailed":[191],"experiment,":[192],"efficiency":[196],"different":[204],"aspects.":[205],"results":[207],"experiment":[209],"also":[210],"show":[211],"detection":[214],"performance":[215],"combine":[220],"well-known":[222],"machine":[223],"learning":[224],"algorithms.":[225]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
