[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kang et al., 2022 - Google Patents

DeepDetection: Privacy-Enhanced Deep Voice Detection and User Authentication for Preventing Voice Phishing

Kang et al., 2022

View HTML
Document ID
6223057704635274916
Author
Kang Y
Kim W
Lim S
Kim H
Seo H
Publication year
Publication venue
Applied Sciences

External Links

Snippet

The deep voice detection technology currently being researched causes personal information leakage because the input voice data are stored in the detection server. To overcome this problem, in this paper, we propose a novel system (ie, DeepDetection) that …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Similar Documents

Publication Publication Date Title
Alshingiti et al. A deep learning-based phishing detection system using CNN, LSTM, and LSTM-CNN
Aggarwal et al. Two-way feature extraction for speech emotion recognition using deep learning
Ghourabi et al. A hybrid CNN-LSTM model for SMS spam detection in arabic and english messages
Kumar et al. Face spoofing, age, gender and facial expression recognition using advance neural network architecture-based biometric system
Li et al. An ensemble stacked convolutional neural network model for environmental event sound recognition
Lin et al. Credit card fraud detection with autoencoder and probabilistic random forest
Wang et al. Network anomaly intrusion detection based on deep learning approach
Bu et al. Deep character-level anomaly detection based on a convolutional autoencoder for zero-day phishing URL detection
Elsadig et al. Intelligent deep machine learning cyber phishing url detection based on bert features extraction
Kang et al. DeepDetection: Privacy-Enhanced Deep Voice Detection and User Authentication for Preventing Voice Phishing
Joshi et al. Machine-learning techniques for predicting phishing attacks in blockchain networks: A comparative study
Muneer et al. Cyberbullying detection on social media using stacking ensemble learning and enhanced BERT
Kasprowski et al. Biometric identification based on keystroke dynamics
Xu et al. Image intelligent detection based on the Gabor wavelet and the neural network
Moussavou Boussougou et al. Attention-based 1D CNN-BILSTM hybrid model enhanced with FastText word embedding for Korean voice phishing detection
Alhakami et al. Evaluating intelligent methods for detecting covid-19 fake news on social media platforms
Wu et al. Malicious url detection model based on bidirectional gated recurrent unit and attention mechanism
Liu et al. Intrusion detection model based on improved transformer
Wu et al. A hybrid intrusion detection model combining SAE with kernel approximation in internet of things
Alkhammash et al. A hybrid ensemble stacking model for gender voice recognition approach
Rasheed et al. An intelligent gender classification system in the era of pandemic chaos with veiled faces
Khan et al. EFFNet-CA: an efficient driver distraction detection based on multiscale features extractions and channel attention mechanism
Alhoraibi et al. Generative Adversarial Network-Based Data Augmentation for Enhancing Wireless Physical Layer Authentication
Islam et al. Manuscripts character recognition using machine learning and deep learning
Zhang et al. Attention-based recurrent temporal restricted Boltzmann machine for radar high resolution range profile sequence recognition