|
|
|
Fahim Sufi
In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from October...
ver más
|
|
|
|
|
|
|
Antonello Pasini and Stefano Amendola
Neural network models are often used to analyse non-linear systems; here, in cases of small datasets, we review our complementary approach to deep learning with the purpose of highlighting the importance and roles (linear, non-linear or threshold) of cer...
ver más
|
|
|
|
|
|
|
Subin Kim, Heejin Hwang, Keunyeong Oh and Jiuk Shin
The seismically deficient column details in existing reinforced concrete buildings affect the overall behavior of the building depending on the failure type of the column. The purpose of this study is to develop and validate a machine-learning-based pred...
ver más
|
|
|
|
|
|
|
Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi
Fingerprint analysis has long been a cornerstone in criminal investigations for suspect identification. Beyond this conventional role, recent efforts have aimed to extract additional demographic information from fingerprints, such as gender, age, and nat...
ver más
|
|
|
|
|
|
|
Stanislav Kirpichenko, Lev Utkin, Andrei Konstantinov and Vladimir Muliukha
A method for estimating the conditional average treatment effect under the condition of censored time-to-event data, called BENK (the Beran Estimator with Neural Kernels), is proposed. The main idea behind the method is to apply the Beran estimator for e...
ver más
|
|
|
|
|
|
|
Danilo Pau, Andrea Pisani and Antonio Candelieri
In the context of TinyML, many research efforts have been devoted to designing forward topologies to support On-Device Learning. Reaching this target would bring numerous advantages, including reductions in latency and computational complexity, stronger ...
ver más
|
|
|
|
|
|
|
Anik Baul, Gobinda Chandra Sarker, Prokash Sikder, Utpal Mozumder and Ahmed Abdelgawad
Short-term load forecasting (STLF) plays a crucial role in the planning, management, and stability of a country?s power system operation. In this study, we have developed a novel approach that can simultaneously predict the load demand of different regio...
ver más
|
|
|
|
|
|
|
Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters and Seyit Camtepe
Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware familie...
ver más
|
|
|
|
|
|
|
Min-Jen Tsai, Ya-Chu Lee and Te-Ming Chen
QR codes (short for Quick Response codes) were originally developed for use in the automotive industry to track factory inventories and logistics, but their popularity has expanded significantly in the past few years due to the widespread applications of...
ver más
|
|
|
|
|
|
|
Marko Jevtic, Sa?a Mladenovic and Andrina Granic
Due to the everchanging and evergrowing nature of programming technologies, the gap between the programming industry?s needs and the educational capabilities of both formal and informal educational environments has never been wider. However, the need to ...
ver más
|
|
|
|