Climate forecasting plays a critical role in understanding and mitigating the impacts of climate change. Advances in machine learning (ML) have significantly enhanced the accuracy of climate projections, particularly ...
详细信息
This study introduces the Collision Clarification Generator (CCG), a Large Language Model-based system designed to assist in documenting traffic accidents. The CCG comprises three modules: Questioning, information Ext...
详细信息
The Musical Metaverse (MM) represents an innovative frontier for the field of New Interfaces for Musical Expression (NIME). The MM holds the potential to redefine areas such as musical composition and performance via ...
详细信息
Accurately predicting long-term crop yield trends remains a crucial challenge in optimizing agricultural practices and ensuring food security. This paper proposes a novel framework that merges real-time data acquired ...
详细信息
Our study on Legal Judgment Prediction (LJP) focuses on indictments, designing innovative tasks for prosecutors to predict reasons, imprisonment, fines, and penalty types. We investigated multi-task learning (MTL), Lo...
详细信息
Cloud computing is the most emerging technology. It has the capability to provide various services like infrastructure, security, data management, databases, and network over the internet. Several cloud service provid...
详细信息
With the increasing number of actors in the under-water environment and the development of new applications, such as large-scale monitoring and autonomous underwater vehicle control, securing underwater communications...
详细信息
The Network Digital Twin is emerging as a promising technology for future networks, including 6G, as it allows to gain deep knowledge of its Physical Twin and to perform 'what-if' analyses in a controlled envi...
A malicious insider's threats who has access to the organization's systems and is familiar with security policies are difficult to detect and can cause significant financial damage. A reconstruction-based anom...
详细信息
A malicious insider's threats who has access to the organization's systems and is familiar with security policies are difficult to detect and can cause significant financial damage. A reconstruction-based anomaly detection method leveraging deep learning is one method for detecting insider threats. The method is employed to solve a data imbalance problem caused by the scarcity of abnormal data in real environments. The method trains a deep learning model to reconstruct normal data received from all users. After training, the model reconstructs normal data more accurately than abnormal data, and the reconstruction-based anomaly detection method can detect anomalies based on the reconstruction difference between normal and abnormal data. However, existing reconstruction-based anomaly detection methods train on all users' normal data using the same network parameters. Consequently, if a behavior is normal for one user but abnormal for another, the reconstruction model learns this behavior as normal because the reconstruction model trains only on normal behaviors. Since normal behaviors differ for each user depending on their position, role, and other factors within the organization, it is necessary to develop methods for detecting abnormal behaviors specific to each user. To address this problem, we propose a transfer learning-based insider threat detection method. The proposed method consists of 1) a pre-trained encoder that outputs latent representations of normal data for all users and 2) user-specific decoders assigned to each user, which are trained on the corresponding user's normal data to reconstruct their normal data. We evaluate the proposed method's detection rate (DR) and area under the curve (AUC) on the CERT dataset and compare it with a deep learning model trained on normal data from all users. The experimental results show that the proposed method achieves higher DR and AUC than the deep learning model. These results indicate that the proposed method en
The rise in video content has amplified the risk of information leakage, prompting the development of various anonymization techniques. These techniques include traditional methods such as pixelation, blurring, and ma...
详细信息
暂无评论