Searched for: subject:"Data%5C+Augmentation"
(1 - 4 of 4)
document
Vlogiaris, Achilleas (author)
Side-channel Attacks can be performed in various ways by measuring the power consumption, the electromagnetic emission, or even by measuring an algorithm's execution time on the targeted device. More or less sophisticated methods can be used to utilize this information in order to perform a Side-channel attack, more specifically by training...
master thesis 2021
document
Pytel, Rafal (author)
Occlusion degrades the performance of human pose estimation. In this paper, we introduce targeted keypoint and body part occlusion attacks. The effects of the attacks are systematically analyzed on the best-performing methods. In addition, we propose occlusion specific data augmentation techniques against keypoint and part attacks. Our extensive...
master thesis 2020
document
De Meer Pardo, Fernando (author)
The scarcity of historical financial data has been a huge hindrance for the development algorithmic trading models ever since the first models were devised. Most financial models assume as hypothesis a series of characteristics regarding the nature of financial time series and seek extracting information about the state of the market through...
master thesis 2019
document
van Ramshorst, Arjan (author)
Knowledge on adversaries during military missions at sea heavily influences decision making, making identification of unknown vessels an important task. Identification of surrounding vessels based on visual data offers an alternative to AIS information (Automatic Identification System), the current standard in vessel identification, which can be...
master thesis 2018
Searched for: subject:"Data%5C+Augmentation"
(1 - 4 of 4)