Searched for: collection%253Air
(41 - 60 of 71)

Pages

document
Apruzzese, Giovanni (author), Pajola, Luca (author), Conti, M. (author)
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labeled. Such labels demand costly expert knowledge, resulting in a lack of real deployments, as well as on papers always relying...
journal article 2022
document
Nurunnabi, A. (author), Teferle, F. N. (author), Laefer, D. F. (author), Lindenbergh, R.C. (author), Hunegnaw, A. (author)
Most deep learning (DL) methods that are not end-to-end use several multi-scale and multi-type hand-crafted features that make the network challenging, more computationally intensive and vulnerable to overfitting. Furthermore, reliance on empirically-based feature dimensionality reduction may lead to misclassification. In contrast, efficient...
journal article 2022
document
Bernardini, Giulia (author), van Iersel, L.J.J. (author), Julien, E.A.T. (author), Stougie, Leen (author)
Combining a set of phylogenetic trees into a single phylogenetic network that explains all of them is a fundamental challenge in evolutionary studies. In this paper, we apply the recently-introduced theoretical framework of cherry picking to design a class of heuristics that are guaranteed to produce a network containing each of the input...
conference paper 2022
document
Apruzzese, Giovanni (author), Conti, M. (author), Yuan, Ying (author)
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that break every ML model, or defenses that withstand most attacks. Unfortunately, little consideration is given to the actual cost of the attack or the defense. Moreover, adversarial samples are often crafted in the "feature-space", making the...
conference paper 2022
document
Forouzandeh Shahraki, N. (author), Zomorodian, Zahra Sadat (author), Tahsildoost, Mohammad (author), Shaghaghian, Zohreh (author)
Recent studies have focused on data-driven methods for building energy efficiency, by using simulated or empirical data, for energy-based design assessment rather than the common physics-based techniques, which are mostly time-consuming. In this paper, the feasibility of using seven different Machine Learning models, including three single...
journal article 2022
document
Robbins, S.A. (author)
Machine Learning (ML) is reaching the peak of a hype cycle. If you can think of a personal or grand societal challenge – then ML is being proposed to solve it. For example, ML is purported to be able to assist in the current global pandemic by predicting COVID-19 outbreaks and identifying carriers (see, e.g., Ardabili et al. 2020). ML can make...
doctoral thesis 2021
document
Applis, L.H. (author), Panichella, A. (author), van Deursen, A. (author)
Metamorphic testing is a well-established testing technique that has been successfully applied in various domains, including testing deep learning models to assess their robustness against data noise or malicious input. Currently, metamorphic testing approaches for machine learning (ML) models focused on image processing and object recognition...
conference paper 2021
document
Maruhashi, J. (author), Dedoussi, I.C. (author), Grewe, V. (author)
poster 2021
document
Rózsás, Árpád (author), Slobbe, Arthur (author), Huizinga, Wyke (author), Kruithof, Maarten (author), Giardina, Giorgia (author)
The degree of similarity between damage patterns often correlates with the likelihood of having similar damage causes. Therefore, deciding whether crack patterns are similar is one of the key steps in assessing the conditions of masonry structures. To our knowledge, no literature has been published regarding masonry crack pattern similarity...
conference paper 2021
document
Akyazi, U. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
The emergence of Cybercrime-as-a-Service (CaaS) is a critical evolution in the cybercrime landscape. A key area of research on CaaS is where and how the supply of CaaS is being matched with demand. Next to underground marketplaces and custom websites, cybercrime forums provide an important channel for CaaS suppliers to attract customers. Our...
conference paper 2021
document
Dahle, F. (author), Arroyo Ohori, G.A.K. (author), Agugiaro, G. (author), Briels, Sven (author)
In many countries digital maps are generally created and provided by Cadastre, Land Registry or National Mapping Agencies. These maps must be accurate and well maintained. However, in most cases, the update process of these maps is still done by hand, often using satellite or aerial imagery. Supporting this process via automatic change...
journal article 2021
document
Kudina, O. (author), de Boer, Bas (author)
Rationale: This paper aims to show how the focus on eradicating bias from Machine Learning decision-support systems in medical diagnosis diverts attention from the hermeneutic nature of medical decision-making and the productive role of bias. We want to show how an introduction of Machine Learning systems alters the diagnostic process....
journal article 2021
document
Stallenberg, D.M. (author), Olsthoorn, Mitchell (author), Panichella, A. (author)
With the ever-increasing use of web APIs in modern-day applications, it is becoming more important to test the system as a whole. In the last decade, tools and approaches have been proposed to automate the creation of system-level test cases for these APIs using evolutionary algorithms (EAs). One of the limiting factors of EAs is that the...
conference paper 2021
document
Mir, S.A.M. (author), Latoskinas, Evaldas (author), Gousios, G. (author)
In this paper, we present ManyTypes4Py, a large Python dataset for machine learning (ML)-based type inference. The dataset contains a total of 5, 382 Python projects with more than 869K type annotations. Duplicate source code files were removed to eliminate the negative effect of the duplication bias. To facilitate training and evaluation of...
conference paper 2021
document
Bai, N. (author), Nourian, Pirouz (author), Luo, Renqian (author), Pereira Roders, A. (author)
The Statements of Outstanding Universal Value (OUV) concerns the core justification for nominating and inscribing cultural and natural heritage properties on the UNESCO World Heritage List, ever since 2007. Ten criteria are specified and measured independently for the selection process. The 2008 ICOMOS Report “What is OUV” has been a successful...
journal article 2021
document
Nurunnabi, A. (author), Teferle, F. N. (author), Li, J. (author), Lindenbergh, R.C. (author), Parvaz, S. (author)
Semantic segmentation of point clouds is indispensable for 3D scene understanding. Point clouds have credibility for capturing geometry of objects including shape, size, and orientation. Deep learning (DL) has been recognized as the most successful approach for image semantic segmentation. Applied to point clouds, performance of the many DL...
journal article 2021
document
Guendel, Ronny (author), Unterhorst, M. (author), Gambi, Ennio (author), Fioranelli, F. (author), Yarovoy, Alexander (author)
Continuous Activities of Daily Living (ADL) recognition in an arbitrary movement direction using five distributed pulsed Ultra-Wideband (UWB) radars in a coordinated network is proposed. Classification approaches in unconstrained activity trajectories that render a more natural occurrence for Human Activity Recognition (HAR) are investigated....
conference paper 2021
document
van Oort, B. (author), Cruz, Luis (author), Aniche, Maurício (author), van Deursen, A. (author)
Artificial Intelligence (AI) and Machine Learning (ML) are pervasive in the current computer science landscape. Yet, there still exists a lack of software engineering experience and best practices in this field. One such best practice, static code analysis, can be used to find code smells, i.e., (potential) defects in the source code,...
conference paper 2021
document
Haakman, Mark (author), Cruz, Luis (author), Huijgens, H.K.M. (author), van Deursen, A. (author)
Tech-leading organizations are embracing the forthcoming artificial intelligence revolution. Intelligent systems are replacing and cooperating with traditional software components. Thus, the same development processes and standards in software engineering ought to be complied in artificial intelligence systems. This study aims to understand the...
journal article 2021
document
Ahishakiye, Emmanuel (author), van Gijzen, M.B. (author), Tumwiine, Julius (author), Wario, Ruth (author), Obungoloch, Johnes (author)
Medical image reconstruction aims to acquire high-quality medical images for clinical usage at minimal cost and risk to the patients. Deep learning and its applications in medical imaging, especially in image reconstruction have received considerable attention in the literature in recent years. This study reviews records obtained...
review 2021
Searched for: collection%253Air
(41 - 60 of 71)

Pages