When a breach is discovered, intrusion detection systems can alert server administrators and researchers and channel packets for cyber security incidents. In complex systems, these reports are becoming uncontrollable....
详细信息
In recent years, Web services are becoming more and more intelligent (e.g., in understanding user preferences) thanks to the integration of components that rely on machinelearning (ML). Before users can interact (inf...
详细信息
ISBN:
(纸本)9783031209833;9783031209840
In recent years, Web services are becoming more and more intelligent (e.g., in understanding user preferences) thanks to the integration of components that rely on machinelearning (ML). Before users can interact (inference phase) with an ML-based service (ML-Service), the underlying ML model must learn (training phase) from existing data, a process that requires long-lasting batch computations. The management of these two, diverse phases is complex and meeting time and quality requirements can hardly be done with manual approaches. This paper highlights some of the major issues in managing ML-services in both training and inference modes and presents some initial solutions that are able to meet set requirements with minimum user inputs. A preliminary evaluation demonstrates that our solutions allow these systems to become more efficient and predictable with respect to their response time and accuracy.
Melanoma is one of the dangerous skin cancer worldwide. Manual detection generally takes more time and difficult to obtain accurate results due to various factors such as change in shape, size and color. In the recent...
详细信息
This work presents the latest results on the development and experimental validation of a human-machine interaction systems based on the use of Wi-Fi commodity devices and the processing of the channel state informati...
详细信息
The purpose of this paper is to evaluate the performance of Vietnamese speech recognition systems provided by top Vietnamese companies such as Vais, Vtcc, Fpt, and Google. This paper presents the results in applying V...
详细信息
Increasing instances of cyber threats, specifically malware, require faster creation of proper detection systems that utilize higher learning algorithms. This paper examines the effectiveness of an AI-malware detectio...
详细信息
ISBN:
(数字)9798331525439
ISBN:
(纸本)9798331525446
Increasing instances of cyber threats, specifically malware, require faster creation of proper detection systems that utilize higher learning algorithms. This paper examines the effectiveness of an AI-malware detection technique whereby a LightGBM model finetuned on the CICAndMal2017 dataset is employed. As it will be shown, the CICAndMal2017 dataset is suitable to evaluate the proposed algorithms for detecting malware since this dataset offers sample of different types of malware and benign software. After carefully extracting the features, and selecting the best parameters that allow for the highest potential LightGBM achieved 97.56% accuracy. The results show that the model achieves low false positive rates while accurately identifying the presence or absence of malware in an application. This research helps to advance the cybersecurity field as a whole by presenting a fast, highly efficient, and accurate solution for real-time malware detection with the use of machinelearning methods as a proof of concept for eradicating modern cyber threats.
The facial expression recognition algorithm based on convolution neural network (Convolutional Neural Network) still has the problem of imperfect feature point extraction. Therefore, a facial expression recognition al...
详细信息
In network security, Intrusion Detection Systems (IDS) is increasingly important due to rise in cyber-attacks. To ensure accurate detection and prevention, IDS leverages machinelearning (ML) and Deep learning (DL) al...
详细信息
Integrating multi-modal data to promote medical image analysis has recently gained great attention. This paper presents a novel scheme to learn the mutual benefits of different modalities to achieve better segmentatio...
详细信息
Integrating multi-modal data to promote medical image analysis has recently gained great attention. This paper presents a novel scheme to learn the mutual benefits of different modalities to achieve better segmentation results for unpaired multi-modal medical images. Our approach tackles two critical issues of this task from a practical perspective: (1) how to effectively learn the semantic consistencies of various modalities (e.g., CT and MRI), and (2) how to leverage the above consistencies to regularize the network learning while preserving its simplicity. To address (1), we leverage a carefully designed External Attention Module (EAM) to align semantic class representations and their correlations of different modalities. To solve (2), the proposed EAM is designed as an external plug-and-play one, which can be discarded once the model is optimized. We have demonstrated the effectiveness of the proposed method on two medical image segmentation scenarios: (1) cardiac structure segmentation, and (2) abdominal multi-organ segmentation. Extensive results show that the proposed method outperforms its counterparts by a wide margin.
In this paper, we study model-based reinforcement learning in an unknown constrained Markov Decision Processes (CMDPs) with reset action. We propose an algorithm, Constrained-UCRL, which uses confidence interval like ...
详细信息
ISBN:
(纸本)9781450376310
In this paper, we study model-based reinforcement learning in an unknown constrained Markov Decision Processes (CMDPs) with reset action. We propose an algorithm, Constrained-UCRL, which uses confidence interval like UCRL2, and solves linear programming problem to compute policy at the start of each episode. We show that Constrained-UCRL achieves sublinear regret bounds (O) over tilde (SA(1/2)T(3/4)) up to logarithmic factors with high probability for both the gain and the constraint violations.
暂无评论