Machine learning (ML) is quickly becoming one of the most transformative technologies in the field of computing. Applications of MLare wide-spread and growing exponentially, revolutionizing the future of major industr...
详细信息
ISBN:
(纸本)9783031752001;9783031752018
Machine learning (ML) is quickly becoming one of the most transformative technologies in the field of computing. Applications of MLare wide-spread and growing exponentially, revolutionizing the future of major industries such as finance, healthcare, automotives, and more. This has made it more necessary than ever to recognize the instability created by adversarial attacks-the deliberate manipulation of data to mislead ML models. This instability must be addressed through researching the effects of adversarial attacks and how they can be better recognized. Our research explored the use of adversarial attacks in dark web network traffic analysis by first improving our understanding of how adversarial attacks could be optimized. We manipulated a dataset of dark web traffic data through the analysis of confusion matrices and Euclidean distances, aiming to cause maximum confusion for each of our models. We then trained and tested each model in a variety of scenarios to further our understanding of weaknesses in both the traffic data and the machine learning techniques employed.
We present a novel reservoir computing approach in which single nonlinear device - semiconductor optical amplifier, replaces the entire nonlinear reservoir to perform computations, without the conventional use of a de...
详细信息
Financial fraud poses a major threat to financial service institutions and clients, facilitating anomaly detection capabilities. This paper dives into deep learning models which can be implemented to detect and distin...
详细信息
The proceedings contain 192 papers. The topics discussed include: application of artificial intelligence and big data in smart buildings;engine detection and online monitoring technology based on image recognition;mec...
ISBN:
(纸本)9798350395631
The proceedings contain 192 papers. The topics discussed include: application of artificial intelligence and big data in smart buildings;engine detection and online monitoring technology based on image recognition;mechanical parts life prediction and health monitoring system based on deep learning;research on optimal zoning of energy Internet source load matching power grid based on improved K-means algorithm;design of power load forecasting algorithm for distribution network based on machine learning;analysis of sea ice area fluctuation in the arctic circle based on big data and SARIMA model;a redesign method for embroidery pattern graphics based on multiscale image processing technology;and research on data mining of university management decision support archives based on cloud computing.
Measuring emotions in educational settings can provide important information in predicting and explaining student learning outcomes. Knowledge of student’s classroom emotions can also help teachers understand th...
详细信息
This research presents a novel solution to the serious global health issue of cardiovascular diseases. The suggested technology revolutionizes remote cardiac monitoring by combining wireless Electrocardiogram sensors ...
详细信息
Crowd counting is a computer vision task that involves using computer algorithms to analyze the number and distribution of crowds. With the world's population increasing, stampedes caused by too many people contin...
详细信息
Given the dynamic nature of SDN environments, it is necessary to quickly recognize Distributed Denial of Service (DDoS) attacks to maintain our network’s integrity and ensure uninterrupted service delivery. However, ...
详细信息
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of Intelligent computing: Theory and Applications. The topics include: Nepali Word Spelling Correction Using Ensemble learning Te...
ISBN:
(纸本)9789819601387
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of Intelligent computing: Theory and Applications. The topics include: Nepali Word Spelling Correction Using Ensemble learning Technique;the Impact of Information Security Policies and Innovations in Digital Technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection Technology;a Hybrid Intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios with the Core Tax Administration System (CTAS);Enabling Grid Stability: Harnessing μPMU Data for Data-Driven Analysis of Grid Frequency Events;machine learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge Technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training Through Game Development: A Comparative Review;usability of Intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
A nevertheless-emerging generation called cloud computing permits customers to pay for services on a usage-based foundation. Internet-primarily based IT offerings are supplied through cloud computing, at the same time...
详细信息
暂无评论