|
|
|
Chenhao Wu, Longgang Xiang, Libiao Chen, Qingcen Zhong and Xiongwei Wu
With the development of location-based services and data collection equipment, the volume of trajectory data has been growing at a phenomenal rate. Raw trajectory data come in the form of sequences of ?coordinate-time-attribute? triplets, which require c...
ver más
|
|
|
|
|
|
|
Yilei Wang, Yuelin Hu, Wenliang Xu and Futai Zou
Dark web vendor identification can be seen as an authorship aliasing problem, aiming to determine whether different accounts on different markets belong to the same real-world vendor, in order to locate cybercriminals involved in dark web market transact...
ver más
|
|
|
|
|
|
|
Olga Kurasova, Arnoldas Bud?ys and Viktor Medvedev
As artificial intelligence has evolved, deep learning models have become important in extracting and interpreting complex patterns from raw multidimensional data. These models produce multidimensional embeddings that, while containing a lot of informatio...
ver más
|
|
|
|
|
|
|
Newlin Shebiah Russel, S Arivazhagan, S G Amrith, S Adarsh
Pág. 25 - 33
|
|
|
|
|
|
|
Xueli Xie, Jianxiang Xi, Xiaogang Yang, Ruitao Lu and Wenxin Xia
|
|
|
|
|
|
|
Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters and Seyit Camtepe
Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware familie...
ver más
|
|
|
|
|
|
|
Kyriakos Apostolidis, Christos Kokkotis, Evangelos Karakasis, Evangeli Karampina, Serafeim Moustakidis, Dimitrios Menychtas, Georgios Giarmatzis, Dimitrios Tsiptsios, Konstantinos Vadikolias and Nikolaos Aggelousis
Stroke remains a predominant cause of mortality and disability worldwide. The endeavor to diagnose stroke through biomechanical time-series data coupled with Artificial Intelligence (AI) poses a formidable challenge, especially amidst constrained partici...
ver más
|
|
|
|
|
|
|
Allam Jaya Prakash, Kiran Kumar Patro, Saunak Samantray, Pawel Plawiak and Mohamed Hammad
An electrocardiogram (ECG) is a unique representation of a person?s identity, similar to fingerprints, and its rhythm and shape are completely different from person to person. Cloning and tampering with ECG-based biometric systems are very difficult. So,...
ver más
|
|
|
|
|
|
|
Gergely Márk Csányi, Renátó Vági, Andrea Megyeri, Anna Fülöp , Dániel Nagy, János Pál Vadász and István Üveges
Few-shot learning is a deep learning subfield that is the focus of research nowadays. This paper addresses the research question of whether a triplet-trained Siamese network, initially designed for multi-class classification, can effectively handle multi...
ver más
|
|
|
|
|
|
|
Dominik Stallmann and Barbara Hammer
Novel neural network models that can handle complex tasks with fewer examples than before are being developed for a wide range of applications. In some fields, even the creation of a few labels is a laborious task and impractical, especially for data tha...
ver más
|
|
|
|