Alongside the rapid development of artificial intelligence and mobile Internet, face recognition has gradually become a mainstream intelligent terminal authentication technology that is widely applied in security, fin...
详细信息
This study builds upon the CNN-SVM model as a sound diagnostic method for identifying five distinct heart diseases. We utilize the effectiveness of the deep learning procedures of various CNNs and the ability of the S...
详细信息
Security plays a crucial role in the field of communication between any two devices. Design of complex unpredictable keys are essential to make the communication more secure in various dimensions of data such as small...
详细信息
Aiming at the main problems existing in traditional C+ + curriculum teaching, relying on the background of the "new engineering" era, a "five in one" C++ teaching innovation mode is proposed. The &...
详细信息
In this study, sentiment analysis was done on a collection of bilingual Hindi and English tweets. Before performing sentiment analysis, we first preprocessed the dataset to improve its quality by removing hashtags, UR...
详细信息
With the ability to identify the same physical content from two or more images, image matching has always been a crucial and fundamental task in the fields of computer vision. Effective methods dealing with image matc...
详细信息
Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human ***,using machine learning in intelligent networks also pr...
详细信息
Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human ***,using machine learning in intelligent networks also presents potential security and privacy threats.A common practice is the so-called poisoning attacks where malicious users inject fake training data with the aim of corrupting the learned *** this survey,we comprehensively review existing poisoning attacks as well as the countermeasures in intelligent networks for the first *** emphasize and compare the principles of the formal poisoning attacks employed in different categories of learning algorithms,and analyze the strengths and limitations of corresponding defense methods in a compact *** also highlight some remaining challenges and future directions in the attack-defense confrontation to promote further research in this emerging yet promising area.
Dysgraphia is a handwriting problem that impairs a person’s ability to write. Even the diagnosis of this condition is challenging, and there is currently no cure. Researchers from all over the world have studied this...
详细信息
3D view reconstruction in a real-time unknown environment poses several challenges to vision-based applications. Herein, this paper outlines real-time experimental results and analysis of 3D view reconstruction method...
详细信息
The introduction of the Attention mechanism by the Internet of Things—or WSN-IoT—in the sector has greatly enhanced the intrusion detection mechanism capabilities, whereas the deep learning techniques, together with...
详细信息
暂无评论