Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2024
Decoupled Training for Semi-supervised Medical Image Segmentation with Worst-Case-Aware Learning
Medical Image Computing and Computer Assisted Intervention – MICCAI 2024Pages 45–55https://doi.org/10.1007/978-3-031-72390-2_5AbstractWhile semi-supervised learning (SSL) has demonstrated remarkable success in natural image segmentation, tackling medical image segmentation with limited annotated data remains a highly relevant and challenging research problem. Many existing ...
- research-articleOctober 2024
Advancing speaker embedding learning: Wespeaker toolkit for research and production
- Shuai Wang,
- Zhengyang Chen,
- Bing Han,
- Hongji Wang,
- Chengdong Liang,
- Binbin Zhang,
- Xu Xiang,
- Wen Ding,
- Johan Rohdin,
- Anna Silnova,
- Yanmin Qian,
- Haizhou Li
AbstractSpeaker modeling plays a crucial role in various tasks, and fixed-dimensional vector representations, known as speaker embeddings, are the predominant modeling approach. These embeddings are typically evaluated within the framework of speaker ...
Highlights- Lightweight and Efficient Design for Both Research and Production
- Extensive Models and Structured Recipes on Different Datasets
- Scalable Data Management with Flexible Unified I/O Design
- Cross-Platform Deployment For PCs ...
- research-articleJuly 2024
Semi-supervised multiview fuzzy broad learning
Information Sciences: an International Journal (ISCI), Volume 672, Issue Chttps://doi.org/10.1016/j.ins.2024.120625AbstractSemi-supervised learning models often rely on restricted assumptions, and can easily suffer from covariate shift or noise. Few studies have investigated the use of fuzzy rule-based methods in the semi-supervised discipline. To improve model ...
Highlights- We build a fuzzy broad semi-supervised learning model which integrates the Mean-Teacher model, fuzzy board learning into a unified framework.
- We suggest an end-to-end multiview semi-supervised classification method that merges the ...
- research-articleFebruary 2024
When less is more: on the value of “co-training” for semi-supervised software defect predictors
Empirical Software Engineering (KLU-EMSE), Volume 29, Issue 2https://doi.org/10.1007/s10664-023-10418-4AbstractLabeling a module defective or non-defective is an expensive task. Hence, there are often limits on how much-labeled data is available for training. Semi-supervised classifiers use far fewer labels for training models. However, there are numerous ...
- research-articleOctober 2023
Deep learning in food category recognition
- Yudong Zhang,
- Lijia Deng,
- Hengde Zhu,
- Wei Wang,
- Zeyu Ren,
- Qinghua Zhou,
- Siyuan Lu,
- Shiting Sun,
- Ziquan Zhu,
- Juan Manuel Gorriz,
- Shuihua Wang
Highlights- We analysed over 350 references from all well-famed databases.
- We provided a ...
Integrating artificial intelligence with food category recognition has been a field of interest for research for the past few decades. It is potentially one of the next steps in revolutionizing human interaction with food. The modern ...
-
- posterSeptember 2023
Poster: Q-Scanner: A Fast Scanning Tool for Large-Scale SSL/TLS Configurations Measurement
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferencePages 1135–1137https://doi.org/10.1145/3603269.3610858Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols are used to encrypt data, protect privacy, and authenticate. However, the security of SSL/TLS itself depends on its configurations. While some scanning tools are used to measure SSL/...
- ArticleJuly 2023
Secure Mobile Ad Hoc Routing Using Confrontations (SMARUC) and Nodes Communication with CCM (Character Classification Model) - OKE (Optimal Key Exchange) - SSL (Secure Socket Layer) Model
Computational Science and Its Applications – ICCSA 2023 WorkshopsPages 160–173https://doi.org/10.1007/978-3-031-37108-0_11AbstractManet (Mobile Adhoc network) is a dynamic network with no fixed infrastructure. So Data Routing among nodes in a wireless network is pretty complex when compared to traditional centralized network architecture. There is always possibility the ...
- surveyFebruary 2023
WPAD: Waiting Patiently for an Announced Disaster
ACM Computing Surveys (CSUR), Volume 55, Issue 10Article No.: 217, Pages 1–29https://doi.org/10.1145/3565361The Web Proxy Auto-Discovery protocol (wpad 1) is widely used despite being flawed. Its purpose is to enable a client machine to autonomously identify an appropriate proxy, if any, to connect to. This can be useful in corporate networks, for example. Its ...
- review-articleNovember 2022
Computerized analysis of speech and voice for Parkinson's disease: A systematic review
Computer Methods and Programs in Biomedicine (CBIO), Volume 226, Issue Chttps://doi.org/10.1016/j.cmpb.2022.107133Highlights- Speech and voice may be valuable markers for PD.
- Large differences between ...
Speech impairment is an early symptom of Parkinson's disease (PD). This study has summarized the literature related to speech and voice in detecting PD and assessing its severity.
... - research-articleJuly 2022
Explaining adversarial vulnerability with a data sparsity hypothesis
- Mahsa Paknezhad,
- Cuong Phuc Ngo,
- Amadeus Aristo Winarto,
- Alistair Cheong,
- Chuen Yang Beh,
- Jiayang Wu,
- Hwee Kuan Lee
Neurocomputing (NEUROC), Volume 495, Issue CPages 178–193https://doi.org/10.1016/j.neucom.2022.01.062AbstractDespite many proposed algorithms to provide robustness to deep learning (DL) models, DL models remain susceptible to adversarial attacks. We hypothesize that the adversarial vulnerability of DL models stems from two factors. The first ...
- research-articleJuly 2022
Deep learning based domain adaptation for mitochondria segmentation on EM volumes
- Daniel Franco-Barranco,
- Julio Pastor-Tronch,
- Aitor González-Marfil,
- Arrate Muñoz-Barrutia,
- Ignacio Arganda-Carreras
Computer Methods and Programs in Biomedicine (CBIO), Volume 222, Issue Chttps://doi.org/10.1016/j.cmpb.2022.106949Graphical abstractDisplay Omitted
AbstractBackground and Objective: Accurate segmentation of electron microscopy (EM) volumes of the brain is essential to characterize neuronal structures at a cell or organelle level. While supervised deep learning methods have ...
- rapid-communicationSeptember 2021
Low-resolution face recognition in resource-constrained environments
Pattern Recognition Letters (PTRL), Volume 149, Issue CPages 193–199https://doi.org/10.1016/j.patrec.2021.05.009Highlights- A LR face recognition model for resource-constrained environments is proposed.
- Our model is lightweight and capable of being effectively trained on small data.
- Our model adopts PixelHop++ which is designed based on the SSL ...
Although Deep Neural Networks (DNNs) have achieved tremendous success in the face recognition task, utilizing them in resource-constrained environments with limited networking and computing is challenging. Such environments often demand a small ...
- research-articleJanuary 2021
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations
Journal of Computer Security (JOCS), Volume 29, Issue 1Pages 25–50https://doi.org/10.3233/JCS-200070HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of web ...
- research-articleNovember 2020
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 1289–1306https://doi.org/10.1145/3372297.3423345Public Key Infrastructures (PKIs) with their trusted Certificate Authorities (CAs) provide the trust backbone for the Internet: CAs sign certificates which prove the identity of servers, applications, or users. To be trusted by operating systems and ...
- research-articleOctober 2020
Exploring HTTPS security inconsistencies: A cross-regional perspective
AbstractIf two or more identical HTTPS clients, located at different geographic locations (regions), make an HTTPS request to the same domain (e.g. example.com), on the same day, will they receive the same HTTPS security guarantees in response?...
- ArticleJuly 2020
Estimation of Greenhouse Gas Emissions in Cement Manufacturing Process Through Blockchain and SSL Based IoT Data Analysis
Computational Science and Its Applications – ICCSA 2020Pages 634–645https://doi.org/10.1007/978-3-030-58802-1_46AbstractRecently, the Internet of Things (IoT) system, which supports human activities based on various types of real data, has attracted attention in various fields. However, the behavior of the system is determined based on the actual data, so if an ...
- research-articleJanuary 2020
Improving the performance of computer-aided diagnosis systems using semi-supervised learning: a survey and analysis
International Journal of Intelligent Information and Database Systems (IJIIDS), Volume 13, Issue 2-4Pages 454–478https://doi.org/10.1504/ijiids.2020.109466The healthcare sector generates important amount of medical data on a daily basis, several machine learning (ML) methods have been developed and studied in order to usefully exploit this substantial sum of information generated colossally, in a wide range ...
- research-articleMay 2019
Covariate shift estimation based adaptive ensemble learning for handling non-stationarity in motor imagery related EEG-based brain-computer interface
Neurocomputing (NEUROC), Volume 343, Issue CPages 154–166https://doi.org/10.1016/j.neucom.2018.04.087AbstractThe non-stationary nature of electroencephalography (EEG) signals makes an EEG-based brain-computer interface (BCI) a dynamic system, thus improving its performance is a challenging task. In addition, it is well-known that due to non-...
- research-articleAugust 2018
X.509 Certificate Error Testing
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and SecurityArticle No.: 42, Pages 1–8https://doi.org/10.1145/3230833.3232820X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network. Combined both of these technologies provides the ...