Music mashups integrate elements from different songs to create surprising and engaging listening experiences. Typically, a mashup combines the vocal track of a base song with the instrumental tracks of complementary ...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
Music mashups integrate elements from different songs to create surprising and engaging listening experiences. Typically, a mashup combines the vocal track of a base song with the instrumental tracks of complementary songs. Automating the production of mashups has been an area of research for decades. Traditional approaches utilize rule-based methods, such as matching tempo and harmonic similarity, to select optimal segments for mashup generation. More recent techniques leverage neural networks to classify segment compatibility. However, both approaches primarily focus on layering segments that are generally compatible, without ensuring their detailed integration and alignment with the vocal track. In contrast, we introduce a novel approach using Graph Neural Networks (GNNs) that learns to rearrange instrumental segments to better align with the base vocal track, resulting in more surprising and accurate music blends for mashup generation. Additionally, we conducted subjective listening tests to evaluate our generated mashups against a baseline model using the same song pairs and the original base songs, assessing our model’s performance. Generated mashups used for evaluation can be found in https://***/***/.
3D Gaussian Splatting (3DGS) is a recent explicit 3D representation that has achieved high-quality reconstruction and real-time rendering of complex scenes. However, the rasterization pipeline still suffers from unnec...
详细信息
Advanced Persistent Threats (APTs) pose a significant challenge to modern cybersecurity due to their stealth and complexity. This paper introduces a scalable host threat detection framework that utilizes provenance gr...
详细信息
ISBN:
(数字)9798331515683
ISBN:
(纸本)9798331515690
Advanced Persistent Threats (APTs) pose a significant challenge to modern cybersecurity due to their stealth and complexity. This paper introduces a scalable host threat detection framework that utilizes provenance graphs and graph representation learning to overcome limitations of traditional defense mechanisms. By optimizing process- and thread-centric analyses within provenance graphs, the system minimizes computational overhead while maintaining robust behavioral insights. Leveraging semantic and topological feature extraction with GraphSAGE-based learning, the framework achieves precise anomaly detection via clustering techniques. Validation on benchmark datasets demonstrates substantial improvements in accuracy, efficiency, and scalability, showcasing the framework's potential for real-world applications.
As the prevalence of Internet of Things (IoT) products keeps increase, the need for robust security measures becomes increasingly vital. Our paper addresses this concern by conducting a detailed comparative analysis o...
详细信息
ISBN:
(数字)9798350375237
ISBN:
(纸本)9798350375244
As the prevalence of Internet of Things (IoT) products keeps increase, the need for robust security measures becomes increasingly vital. Our paper addresses this concern by conducting a detailed comparative analysis of various machine learning methods, assessing their effectiveness in detecting and predicting malicious activities associated with IoT botnets. This paper meticulously examines initial identification methods for IoT botnet operations using advanced machine learning (ML) prediction techniques. To achieve this, we utilize the CICIoT2023 Dataset, a real-world IoT dataset obtained from networks that captures diverse device interactions and communication patterns. This dataset acts as the framework for constructing and evaluating numerous machine learning techniques, including support vector machines (SVM), k-nearest neighbours (k-NN), Naive Bayes, random forest (RF), logistic regression (LR), and decision trees (DT) approaches. Performance metrics such as accuracy, precision, F1-score, ROC curve, confusion matrix, and recall are employed to gain insights into the algorithms’ capabilities in botnet detection. Furthermore, this paper delves into an examination of the trade-offs between computational complexity and detection accuracy. This analysis aids in selecting the most suitable ML techniques tailored to specific IoT security scenarios. This comparative analysis lays the groundwork for the advancement of IoT botnet discovery strategies, providing essential insights to researchers, practitioners, and industry experts working to strengthen IoT ecosystems against growing cyber threats. We anticipate that our findings will spark more conversations and developments in the sector, promoting the establishment of more robust and adaptable security measures across the IoT landscape.
Accurate traffic sign recognition is crucial for autonomous vehicles. This paper proposes a novel deep learning approach for sign classification that addresses limitations in training data. Our method employs a three-...
详细信息
ISBN:
(数字)9798350365337
ISBN:
(纸本)9798350365344
Accurate traffic sign recognition is crucial for autonomous vehicles. This paper proposes a novel deep learning approach for sign classification that addresses limitations in training data. Our method employs a three-step process: strategic data augmentation with rotation limitations for realistic variations, feature extraction using parallel atrous convolution layers with varying dilation rates to capture multi-scale information, and robust feature map generation through output concatenation. This approach achieves a remarkable accuracy of 94.65%, surpassing the performance of established pre-trained models like VGG-16, ResNet-50, and AlexNet. This research contributes a significant advancement in real-world traffic sign classification in autonomous vehicles.
Lexical resemblances among a group of languages indicate that the languages could be genetically related, i.e., they could have descended from a common ancestral language. However, such resemblances can arise by chanc...
Tremendous amount of meteorological data is being generated on a daily basis from a number of sources such as weather stations, balloons, satellites, sensors etc. Timely weather prediction helps people plan everyday l...
Tremendous amount of meteorological data is being generated on a daily basis from a number of sources such as weather stations, balloons, satellites, sensors etc. Timely weather prediction helps people plan everyday life events. Long Short Term Memory (LSTM) networks perform extremely well for capturing dependencies in time series datasets. Number of neurons in hidden layer highly impacts the performance of the LSTM network. The hit and Trial method for selecting the neurons consumes a lot of time and resources and might not lead to a global optimum solution. In this research work, two techniques, i.e. Genetic Algorithm optimized LSTM (LSTM_GA) and Artificial Bee Colony optimized LSTM (LSTM_ABC) have been proposed and implemented to automate the selection of the hidden layer’s neurons for improved weather prediction. Proposed techniques have been implemented using DeepLearning4j library making the techniques scalable on clusters of machines. For evaluating the performance of proposed techniques, 15 years Brazil’s weather dataset has been used. The experimental results proved that the proposed LSTM_GA and LSTM_ABC techniques have the reduced MAE value of 0.0074 and 0.0075 respectively while the LSTM network without any optimization has a relatively higher MAE value of 0.0086.
The abstract delves into the groundbreaking realm of DeepFakes, a revolutionary synthesis of deep learning and synthetic media. Central to DeepFake generation is the utilization of Generative Adversarial Networks (GAN...
The abstract delves into the groundbreaking realm of DeepFakes, a revolutionary synthesis of deep learning and synthetic media. Central to DeepFake generation is the utilization of Generative Adversarial Networks (GANs), particularly the innovative mechanisms of face reenactment involving DCGANs (Deep Convolutional GANs) and Autoencoders. These technologies empower a generator to transform random noise into hyper-realistic visuals, capturing intricate details such as facial expressions and lighting conditions through latent space interpolation. The adversarial interplay between generator and discriminator continuously refines the authenticity of the generated content. While DeepFakes unlocks creative possibilities for artists and filmmakers, the abstract underscores the ethical concerns surrounding misinformation, privacy breaches, and trust erosion in digital media. The discourse navigates the delicate balance between creative freedom and responsible use, highlighting how DeepFakes, with their roots in advanced deep learning techniques, redefine our perception of synthetic media, challenging notions of reality in our increasingly digital world.
This paper delves into the challenges of binary classification using imbalanced datasets, particularly when instances of interest are infrequent. It explores a comprehensive approach that integrates Synthetic Minority...
详细信息
A major global worry in the ever-expanding digital ecosystem is the spread of incorrect information. The ability to recognize false news in non-English languages is still lacking, despite great advancements in the ide...
A major global worry in the ever-expanding digital ecosystem is the spread of incorrect information. The ability to recognize false news in non-English languages is still lacking, despite great advancements in the identification of false news in English. This research looks at the unique opportunities and problems that these languages bring. It offers a thorough assessment and comparative analysis of existing approaches, highlighting their advantages and disadvantages. By doing comparative study of various differ techniques we have found that Multilingual-Fake Model currently works the best. The results of the study highlight how critical it is to use inclusive and linguistically varied tactics in order to successfully counter disinformation. It emphasizes how crucial it is to create trustworthy tools and processes that can adjust to the subtleties of many languages and their socio-cultural settings. It highlights how crucial it is to comprehend these components completely in order to create detection methods that are more potent. The study admits that the dissemination of incorrect information is an issue that is deeply rooted in the social environment of linguistic groups and transcends language borders. A discussion of possible future study areas closes the report. In a multilingual culture, this study marks a substantial breakthrough toward the development of more thorough and efficient techniques for spotting bogus news.
暂无评论