Searched for: +
(1 - 7 of 7)
document
Palakodeti, Anitej (author)
Generating synthetic images has wide applications in several fields such as creating datasets for machine learning or using these images to investigate the behaviour of machine learning models. An essential requirement when generating images is to control aspects such as the entities or objects in the image. Controlling this helps in creating...
master thesis 2022
document
Oedayrajsingh Varma, Vanisha (author)
Many artificial intelligence (AI) systems are built using black-box machine learning (ML) algorithms. The lack of transparency and interpretability reduces their trustworthiness. In recent years, research into explainable AI (XAI) has increased. These systems are designed to tackle common ML issues such as trust, accountability, and transparency...
bachelor thesis 2022
document
Enthoven, Maarten (author)
At the Center for Ultrasound and Brain imaging at Erasmus MC in Rotterdam, a mouse's visual cortex had been imaged using the fUS technique. The mouse had been exposed to different visual stimuli. The stimuli varied in position, size, and shape. We investigate how the measured task-based fUS signals differ depending on the visual stimuli...
master thesis 2021
document
Bergþórsdóttir, Kristin (author)
Machine learning methods like outlier detection are becoming increasingly more popular as tools in the fight against money laundering. In this thesis, we analyse the Isolation Forest outlier detection algorithm in detail and introduce a new local explanation method for Isolation Forest, the MI-Local-DIFFI (Multiple Indicator Local-DIFFI) method....
master thesis 2020
document
Dedja, Klest (author)
Since the last decade, we are assisting a widespread use of “black box” Machine Learning algorithms, these are algorithms with excellent performance but whose outcomes are hard to understand to a human agent. However, there are some situation when it is important to understand why a certain output is given,<br/>and the field of explanability in...
master thesis 2019
document
van der Valk, Daan (author)
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on unintended leakage. Profiled attacks are the most powerful SCAs, as they assume the attacker has a perfect copy of the target device under his control. In recent years, machine learning (ML) and deep learning (DL) techniques have became popular as...
master thesis 2019
document
Rao, Shashank (author)
Sleep is a natural state of our mind and body during which our muscles heal and our memories are consolidated. It is such a habitual phenomenon that we have been viewing it as another ordinary task in our day-to-day life. However, owing to the current fast-paced, technology-driven generation, we are letting ourselves be sleep-deprived, giving...
master thesis 2018
Searched for: +
(1 - 7 of 7)