Audio-driven talking face has attracted broad interest from academia and industry recently. However, data acquisition and labeling in audio-driven talking face are labor-intensive and costly. The lack of data resource...
详细信息
The face of a humanoid robot can affect the user experience, and the detection of face preference is particularly important. Preference detection belongs to a branch of emotion recognition that has received much atten...
详细信息
Privacy in deep learning is receiving tremendous attention with its wide applications in industry and academics. Recent studies have shown the internal structure of a deep neural network is easily inferred via side-ch...
详细信息
The study illustrates a first step towards an ongoing work aimed at developing a dataset of dialogues potentially useful for customer service conversation management between humans and AI chatbots. The approach exploi...
详细信息
Intrusion detection system (IDS) combines software and hardware to detect network attacks. In this paper, we propose a new intrusion detection method based on an improved BP neural network algorithm. We improve the BP...
详细信息
Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic *** recent times,the most complex task in Software Defined Network(SDN)is security,which is...
详细信息
Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic *** recent times,the most complex task in Software Defined Network(SDN)is security,which is based on a centralized,programmable ***,monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN ***,this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms:K-means,Farthest First,Canopy,Density-based algorithm,and Exception-maximization(EM),using the Waikato Environment for Knowledge Analysis(WEKA)software to compare extensively between these five ***,this paper presents an SDN-based intrusion detection system using a deep learning(DL)model with the KDD(Knowledge Discovery in Databases)***,the utilized dataset is clustered into normal and four major attack categories via the clustering ***,a deep learning method is projected for building an efficient SDN-based intrusion detection *** results provide a comprehensive analysis and a flawless reasonable study of different kinds of attacks incorporated in the KDD ***,the outcomes reveal that the proposed deep learning method provides efficient intrusion detection performance compared to existing *** example,the proposed method achieves a detection accuracy of 94.21%for the examined dataset.
Hidden Vector Encryption (HVE) is a new kind of attribute-based encryption in which a vector is hidden in the ciphertext or linked with the secret key. In ESORICS 2014, Phuong et al. proposed an HVE scheme with consta...
详细信息
Class incremental learning (CIL) algorithms aim to continually learn new object classes from incrementally arriving data while not forgetting past learned classes. The common evaluation protocol for CIL algorithms is ...
详细信息
This paper addresses the task of learning periodic information using deep neural networks to achieve real-time, environment-independent sound source localization. Previous papers showed phase data is the most signific...
详细信息
暂无评论