This article explores the application of Large Language Models (LLMs), including proprietary models such as OpenAI's ChatGPT 4o and ChatGPT 4o-mini, Anthropic's Claude 3.5 Sonnet and Claude 3.7 Sonnet, and Goo...
详细信息
In the realm of multi-intent spoken language understanding, recent advancements have leveraged the potential of prompt learning frameworks. However, critical gaps exist in these frameworks: the lack of explicit modeli...
详细信息
Large language models (LLMs) have significantly advanced performance across a spectrum of natural language processing (NLP) tasks. Yet, their application to knowledge graphs (KGs), which describe facts in the form of ...
Parallel I/O is a critical technique for moving data between compute and storage subsystems of supercomputers. With massive amounts of data produced or consumed by compute nodes, high-performant parallel I/O is essent...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly ...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly employed to prevent *** systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate *** have been made in the past to detect new attacks using machine learning and deep learning techniques,however,these efforts have been *** this paper,we propose two deep learning models to automatically detect various types of intrusion attacks in IoT ***,we experimentally evaluate the use of two Convolutional Neural Networks(CNN)to detect nine distinct types of attacks listed in the NF-UNSW-NB15-v2 *** accomplish this goal,the network stream data were initially converted to twodimensional images,which were then used to train the neural network *** also propose two baseline models to demonstrate the performance of the proposed ***,both models achieve high accuracy in detecting the majority of these nine attacks.
Three-dimensional (3D) human pose estimation (HPE) targets to produce the 3D spatial coordinates of the human pose from 2D images. 3D HPE is a basic computer vision task for many intelligent industrial applications. C...
详细信息
Information overload is a major problem for many people who use the internet. This is because there is so much information available that it can be hard to know where to start. Filtering tools, like the Recommender Sy...
详细信息
In order to promote the evaluation performance of deep learning infrared automatic target recognition (ATR) algorithms in the complex environment of air-to-air missile research, we proposed an analytic hierarchy proce...
详细信息
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious...
详细信息
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious issues during network management,including identifying malicious traffic,which is a *** remains an open contest over how to learn features in IDS since current approaches use deep learning *** learning,which combines swarm intelligence and evolution,is gaining attention for further improvement against cyber *** this study,we employed a PSO-GA(fusion of particle swarm optimization(PSO)and genetic algorithm(GA))for feature selection on the CICIDS-2017 *** achieve better accuracy,we proposed a hybrid model called LSTM-GRU of deep learning that fused the GRU(gated recurrent unit)and LSTM(long short-term memory).The results show considerable improvement,detecting several network attacks with 98.86%accuracy.A comparative study with other current methods confirms the efficacy of our proposed IDS scheme.
Open Government data (OGD) refers to the provision of data produced by the government to the general public, in a format that is readily readable and can be used by machines with ease. It can also promote transparency...
详细信息
暂无评论