-
101
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
Published 2023“…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
Get full text
Get full text
Get full text
article -
102
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
Published 2023“…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
-
103
-
104
-
105
Unsupervised outlier detection in multidimensional data
Published 2022“…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
-
106
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
Published 2014Get full text
doctoralThesis -
107
Particle swarm optimization algorithm: review and applications
Published 2024“…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
Get full text
-
108
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
109
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
110
Parallel Algorithm for Hardware Implementation of Inverse Halftoning
Published 2005“…The algorithm is based on Lookup Tables from which the inverse halftone value of a pixel is directly determined using a pattern of pixels. …”
Get full text
article -
111
Parallel algorithm for hardware implementation of inverse halftoning
Published 2005“…The algorithm is based on lookup tables from which the inverse halftone value of a pixel is directly determined using a pattern of pixels. …”
Get full text
Get full text
article -
112
Combinatorial method for bandwidth selection in wind speed kernel density estimation
Published 2019“…In this study, a non-parametric combinatorial method is implemented for obtaining an accurate non-parametric kernel density estimation (KDE)-based statistical model of wind speed, in which the selection of the bandwidth parameter is optimised concerning mean integrated absolute error (L 1 error ) between the true and hypothesised densities. …”
Get full text
-
113
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
Published 2018“…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …”
-
114
-
115
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…Based on our simulation findings, our strategy surpasses the VanillaF selection approach in terms of maximizing both the revenues of the client devices and accuracy of the global federated learning model.…”
Get full text
Get full text
Get full text
masterThesis -
116
Creating and detecting fake reviews of online products
Published 2022“…In this research, we address the creation and detection of fake reviews. First, we experiment with two language models, ULMFiT and GPT-2, to generate fake product reviews based on an Amazon e-commerce dataset. …”
-
117
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…We, therefore, Propose in this paper, a handcrafted feature based Writer-Independent (WI) signature verification system to detect synthetic writers and signatures through handcrafted features. …”
Get full text
-
118
A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition
Published 2025“…Most improved RF versions modify attribute selection processes or combine them with other machine learning algorithms, increasing their complexity. …”
-
119
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
120
Simultaneous stabilization of multimachine power systems viagenetic algorithms
Published 1999“…The power system operating at various conditions is treated as a finite set of plants. The problem of selecting the parameters of power system stabilizers which simultaneously stabilize this set of plants is converted to a simple optimization problem which is solved by a genetic algorithm with an eigenvalue-based objective function. …”
Get full text
Get full text
article