Kang et al., 2022 - Google Patents
DeepDetection: Privacy-Enhanced Deep Voice Detection and User Authentication for Preventing Voice PhishingKang et al., 2022
View HTML- Document ID
- 6223057704635274916
- Author
- Kang Y
- Kim W
- Lim S
- Kim H
- Seo H
- Publication year
- Publication venue
- Applied Sciences
External Links
Snippet
The deep voice detection technology currently being researched causes personal information leakage because the input voice data are stored in the detection server. To overcome this problem, in this paper, we propose a novel system (ie, DeepDetection) that …
- 238000001514 detection method 0 title abstract description 81
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alshingiti et al. | A deep learning-based phishing detection system using CNN, LSTM, and LSTM-CNN | |
Aggarwal et al. | Two-way feature extraction for speech emotion recognition using deep learning | |
Ghourabi et al. | A hybrid CNN-LSTM model for SMS spam detection in arabic and english messages | |
Kumar et al. | Face spoofing, age, gender and facial expression recognition using advance neural network architecture-based biometric system | |
Li et al. | An ensemble stacked convolutional neural network model for environmental event sound recognition | |
Lin et al. | Credit card fraud detection with autoencoder and probabilistic random forest | |
Wang et al. | Network anomaly intrusion detection based on deep learning approach | |
Bu et al. | Deep character-level anomaly detection based on a convolutional autoencoder for zero-day phishing URL detection | |
Elsadig et al. | Intelligent deep machine learning cyber phishing url detection based on bert features extraction | |
Kang et al. | DeepDetection: Privacy-Enhanced Deep Voice Detection and User Authentication for Preventing Voice Phishing | |
Joshi et al. | Machine-learning techniques for predicting phishing attacks in blockchain networks: A comparative study | |
Muneer et al. | Cyberbullying detection on social media using stacking ensemble learning and enhanced BERT | |
Kasprowski et al. | Biometric identification based on keystroke dynamics | |
Xu et al. | Image intelligent detection based on the Gabor wavelet and the neural network | |
Moussavou Boussougou et al. | Attention-based 1D CNN-BILSTM hybrid model enhanced with FastText word embedding for Korean voice phishing detection | |
Alhakami et al. | Evaluating intelligent methods for detecting covid-19 fake news on social media platforms | |
Wu et al. | Malicious url detection model based on bidirectional gated recurrent unit and attention mechanism | |
Liu et al. | Intrusion detection model based on improved transformer | |
Wu et al. | A hybrid intrusion detection model combining SAE with kernel approximation in internet of things | |
Alkhammash et al. | A hybrid ensemble stacking model for gender voice recognition approach | |
Rasheed et al. | An intelligent gender classification system in the era of pandemic chaos with veiled faces | |
Khan et al. | EFFNet-CA: an efficient driver distraction detection based on multiscale features extractions and channel attention mechanism | |
Alhoraibi et al. | Generative Adversarial Network-Based Data Augmentation for Enhancing Wireless Physical Layer Authentication | |
Islam et al. | Manuscripts character recognition using machine learning and deep learning | |
Zhang et al. | Attention-based recurrent temporal restricted Boltzmann machine for radar high resolution range profile sequence recognition |