Search results for "ML"
showing 10 items of 1465 documents
Hypervisor-assisted dynamic malware analysis
2021
AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…
Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
2016
International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…
Towards a Hierarchical Multitask Classification Framework for Cultural Heritage
2018
Digital technologies such as 3D imaging, data analytics and computer vision opened the door to a large set of applications in cultural heritage. Digital acquisition of a cultural assets takes nowadays a couple of seconds thanks to the achievements in 2D and 3D acquisition technologies. However, enriching these cultural assets with labels and relevant metadata is still not fully automatized especially due to their nature and specificities. With the recent publication of several cultural heritage datasets, many researchers are tackling the challenge of effectively classifying and annotating digital heritage. The challenges that are often addressed are related to visual recognition and image c…
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
A Method of Three-Dimensional Visualization of Molecular Processes of Apoptosis
2014
Apoptosis or programmed cell death plays an important role in many physiological states and diseases. Detection of apoptotic cells, tracing the development of apoptosis, drug development and regulation of apoptosis are an important parts of basic research in medicine. A large number of models have been developed that are based on the differential equations of the chemical kinetics, and can be expressed in a uniform notation using some XML-based languages, such as SBML and CellML. We describe the CellML and the simulation environment OpenCell herein. These tools can display models schematically and output results in the form of graphs showing time dependencies of component concentrations. Ho…
From the nearest neighbour rule to decision trees
1998
This paper proposes an algorithm to design a tree-like classifier whose result is equivalent to that achieved by the classical Nearest Neighbour rule. The procedure consists of a particular decomposition of a d-dimensional feature space into a set of convex regions with prototypes from just one class. Some experimental results over synthetic and real databases are provided in order to illustrate the applicability of the method.
Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario
2006
In order to resist an unauthorized use of the resources accessible through mobile terminals, masquerader detection means can be employed. In this paper, the problem of mobile-masquerader detection is approached as a classification problem, and the detection is performed by an ensemble of one-class classifiers. Each classifier compares a measure describing user behavior or environment with the profile accumulating the information about past behavior and environment. The accuracy of classification is empirically estimated by experimenting with a dataset describing the behavior and environment of two groups of mobile users, where the users within groups are affiliated with each other. It is as…
Additive noise and multiplicative bias as disclosure limitation techniques for continuous microdata: A simulation study
2004
This paper focuses on a combination of two disclosure limitation techniques, additive noise and multiplicative bias, and studies their efficacy in protecting confidentiality of continuous microdata. A Bayesian intruder model is extensively simulated in order to assess the performance of these disclosure limitation techniques as a function of key parameters like the variability amongst profiles in the original data, the amount of users prior information, the amount of bias and noise introduced in the data. The results of the simulation offer insight into the degree of vulnerability of data on continuous random variables and suggests some guidelines for effective protection measures.
CultReal—A Rapid Development Platform for AR Cultural Spaces, with Fused Localization
2021
Virtual and augmented reality technologies have known an impressive market evolution due to their potential to provide immersive experiences. However, they still have significant difficulties to enable fully fledged, consumer-ready applications that can handle complex tasks such as multi-user collaboration or time-persistent experiences. In this context, CultReal is a rapid creation and deployment platform for augmented reality (AR), aiming to revitalize cultural spaces. The platform’s content management system stores a representation of the environment, together with a database of multimedia objects that can be associated with a location. The localization component fuses data from beacons …
Gabor filtering for feature extraction on complex images: application to defect detection on semiconductors
2006
AbstractThis paper is an extension of previous work on the image segmentation of electronic structures on patterned wafers to improve the defect detection process on optical inspection tools. Die-to-die wafer inspection is based upon the comparison of the same area on two neighbourhood dies. The dissimilarities between the images are a result of defects in this area of one of the dies. The noise level can vary from one structure to the other, within the same image. Therefore, segmentation is needed to create a mask and apply an optimal threshold in each region. Contrast variation on the texture can affect the response of the parameters used for the segmentation. This paper shows a method of…