بدائل البحث:
code encryption » secure encryption (توسيع البحث)
يعرض 21 - 40 نتائج من 149 نتيجة بحث عن '(( model ((detection algorithms) OR (detection algorithm)) ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 21

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 22

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
  3. 23

    HVAC system attack detection dataset حسب Mariam Elnour (14147790)

    منشور في 2021
    "…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
  4. 24
  5. 25
  6. 26

    Creating and detecting fake reviews of online products حسب Joni Salminen (7434770)

    منشور في 2022
    "…We show that a machine classifier can accomplish this goal near-perfectly, whereas human raters exhibit significantly lower accuracy and agreement than the tested algorithms. The model was also effective on detected human generated fake reviews. …"
  7. 27
  8. 28

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  9. 29

    Capturing outline of fonts using genetic algorithm and splines حسب Sarfraz, M.

    منشور في 2001
    "…We present a method to convert the original problem into a discrete combinatorial optimization problem and solve it by a genetic algorithm. We also incorporate a corner detection algorithm to detect significant points which are necessary to capture a pleasant looking spline fitting for shapes such as fonts. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 30
  11. 31

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…The proposed hybrid model improves the accuracy of all the studied datasets and can be integrated into different social media sites to automatically detect cyberbullying from Arabic social media posts. …"
    احصل على النص الكامل
  12. 32

    Artificial Intelligence for Skin Cancer Detection: Scoping Review حسب Abdulrahman Takiddin (14153181)

    منشور في 2021
    "…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…"
  13. 33
  14. 34

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems حسب Boukhari, Bahia

    منشور في 2019
    "…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 35
  16. 36

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach حسب Nagendra Prabhu Selvaraj (17542041)

    منشور في 2022
    "…The goal is to be able to detect a larger range of bots and botnets by relying on several techniques called trust model. …"
  17. 37

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…Several procedures have been recently proposed to detect sub-network differences in pairwise labeled weighted networks.…"
  18. 38

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  19. 39

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …"
  20. 40

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array حسب Amran Hossain (570706)

    منشور في 2022
    "…Later, a nine-antenna array-based microwave brain imaging (MBI) system is implemented and investigated by using phantom model. After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …"