C Xu, J Shen, X Du, F Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
To improve the performance of network intrusion detection systems (IDS), we applied deep learning theory to intrusion detection and developed a deep network model with automatic …
JM Hernández-Lobato… - … conference on machine …, 2015 - proceedings.mlr.press
Large multilayer neural networks trained with backpropagation have recently achieved state- of-the-art results in a wide range of problems. However, using backprop for neural net …
G Zhao, J Huang - Proceedings of the 2018 26th ACM joint meeting on …, 2018 - dl.acm.org
Measuring code similarity is fundamental for many software engineering tasks, eg, code search, refactoring and reuse. However, most existing techniques focus on code syntactical …
Y Min, A Hao, X Chai, X Chen - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
Abstract Vision-based Continuous Sign Language Recognition (CSLR) aims to recognize unsegmented signs from image streams. Overfitting is one of the most critical problems in …
Learning acoustic models directly from the raw waveform data with minimal processing is challenging. Current waveform-based models have generally used very few (~ 2) …
Several speaker recognition algorithms failed to get the best results because of the wildly varying datasets and feature sets for classification. Gender information helps reduce this …
Speaker recognition (SR) is widely used in our daily life as a biometric authentication or identification mechanism. The popularity of SR brings in serious security concerns, as …
The trend of pushing inference from cloud to edge due to concerns of latency, bandwidth, and privacy has created demand for energy-efficient neural network hardware. This paper …
J Oruh, S Viriri, A Adegun - IEEE Access, 2022 - ieeexplore.ieee.org
Automatic speech recognition (ASR) is one of the most demanding tasks in natural language processing owing to its complexity. Recently, deep learning approaches have been …