Search Results - "Attacker"
Suggested Topics within your search.
Suggested Topics within your search.
- Terrorism, armed struggle 47
- History of engineering & technology 46
- Technology: general issues 42
- Warfare & defence 20
- International relations 19
- Media studies 18
- Politics & government 18
- Research & information: general 17
- Computer security 15
- Society & social sciences 15
- Humanities 14
- Medicine 14
- Computer networks 12
- Computer science 12
- Information technology industries 12
- Military engineering 12
- Violence in society 12
- Data protection 11
- European history 11
- Sociology 11
- Data and Information Security 10
- Social & cultural history 10
- Artificial intelligence 9
- Biology, life sciences 9
- History of the Americas 9
- Literature: history & criticism 9
- Asian history 8
- History 8
- Philosophy 8
- Political science & theory 8
-
661
BUiD Doctoral Research Conference 2022 Multidisciplinary Studies /
Published 2023Table of Contents: “…A Theoretical Analysis & Case Study Paper in one of Abu Dhabi Private Schools -- The Education System in Post-Conflict Syria - Examining PIRLS as an Ideal International Assessment Measure to Ensure the Quality of Students Achievements -- Using Nearpod to promote engagement in online ESL classes: A mixed-methods study in the context of higher education -- Investigating Emirati Students' Practices of Learning Block-Based Programming in an Online Learning Context: Evidence from a UAE National Program -- A Quantitative Study on The Impact of Online learning on Reading Comprehension Skills -- Exploring pedagogical approaches for online and on-campus teaching -- Simulation Study on The Effect of Courtyards Design on Natural Ventilation: The Case Study of a Beauty Centre in Germany -- A Sustainable Approach to Improve the Interior Design of Existing Space: The Case of the BUiD Main Lobby -- Summarizing a Twitter Feed using Weighted Frequency -- Preventive Maintenance Using Recycled Asphalt -- Structural Causes of Concrete Deterioration - Sulphate Attack.…”
Link to Metadata
Electronic eBook -
662
Language Technologies for the Challenges of the Digital Age 27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings /
Published 2018Table of Contents: “…Examining the Impact of Implicitness on the Perception of Hate Speech -- Automatic Classification of Abusive Language and Personal Attacks in Various Forms of Online Communication -- Token Level Code-Switching Detection Using Wikipedia as a Lexical Resource -- How Social Media Text Analysis Can Inform Disaster Management -- A Comparative Study of Uncertainty Based Active Learning Strategies for General Purpose Twitter Sentiment Analysis with Deep Neural Networks -- An Infrastructure for Empowering Internet Users to Handle Fake News and Other Online Media Phenomena -- Different Types of Automated and Semi-automated Semantic Storytelling: Curation Technologies for Different Sectors -- Twitter Geolocation Prediction Using Neural Networks -- Diachronic Variation of Temporal Expressions in Scientific Writing Through the Lens of Relative Entropy -- A Case Study on the Relevance of the Competence Assumption for Implicature Calculation in Dialogue Systems -- Supporting Sustainable Process Documentation -- Optimizing Visual Representations in Semantic Multi-Modal Models with Dimensionality Reduction, De-noising and Contextual Information -- Using Argumentative Structure to Grade Persuasive Essays.…”
Link to Metadata
Electronic eBook -
663
Computer Aided Verification 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I /
Published 2022Table of Contents: “…Verifying Probabilistic Programs via Generating Functions -- Abstraction-Renement for Hierarchical Probabilistic Models -- Formal Methods for Neural Networks Shared Certificates for Neural Network Verification -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- Verifying Neural Networks Against Backdoor Attacks -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- Neural Network Robustness as a Verication Property: A Principled Case Study -- Software Verication and Model Checking The Lattice-Theoretic Essence of Property Directed Reachability Analysis -- A‑ne Loop Invariant Generation via Matrix Algebra -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- Proof-guided Underapproximation Widening for Bounded Model Checking -- SolCMC: Solidity Compiler's Model Checker -- Sharygina Hyperproperties and Security Software Verication of Hyperproperties Beyond k-Safety -- Abstraction Modulo Stability for Reverse Engineering -- A Modular and Highly Extensible API Fuzzer for SMT Solvers -- Automata and Logic FORQ-based Language Inclusion Formal Testing -- Sound Automation of Magic Wands -- Divide-and-Conquer Determinization of Büchi Automata based on SCC Decomposition -- Complementing Büchi Automata with Ranker -- Deductive Verication and Decision Procedures Even Faster Conicts and Lazier Reductions for String Solvers -- Local Search For SMT on Linear Integer Arithmetic -- Reasoning about Data Trees using CHCs -- Veried Erasure Correction in Coq with MathComp and VST -- Appel End-to-end Mechanised Proof of an eBPF Virtual Machine for Microcontrollers -- A DSL and Verication Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols -- Machine Learning Specication-Guided Learning of Nash Equilibria with High Social Welfare -- Synthesizing Fair Decision Trees via Iterative Constraint Solving -- SMT-based Translation Validation for Machine Learning Compiler -- Lee Verifying Fairness in Quantum Machine Learning -- MoGym: Using Formal Models for Training and Verifying Decision-making Agents -- Synthesis and Concurrency Synthesis and Analysis of Petri Nets from Causal Specications -- Verifying generalised and structural soundness of workow netsvia relaxations -- Capture, Analyze, Diagnose: Realizability Checking of Requirements in FRET -- Information Flow Guided Synthesis -- Randomized Synthesis for Diversity and Cost Constraints with Control Improvisation.…”
Link to Metadata
Electronic eBook -
664
Computer Aided Verification 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part II /
Published 2022Table of Contents: “…Verifying Probabilistic Programs via Generating Functions -- Abstraction-Renement for Hierarchical Probabilistic Models -- Formal Methods for Neural Networks Shared Certificates for Neural Network Verification -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- Verifying Neural Networks Against Backdoor Attacks -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- Neural Network Robustness as a Verication Property: A Principled Case Study -- Software Verication and Model Checking The Lattice-Theoretic Essence of Property Directed Reachability Analysis -- A‑ne Loop Invariant Generation via Matrix Algebra -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- Proof-guided Underapproximation Widening for Bounded Model Checking -- SolCMC: Solidity Compiler's Model Checker -- Sharygina Hyperproperties and Security Software Verication of Hyperproperties Beyond k-Safety -- Abstraction Modulo Stability for Reverse Engineering -- A Modular and Highly Extensible API Fuzzer for SMT Solvers -- Automata and Logic FORQ-based Language Inclusion Formal Testing -- Sound Automation of Magic Wands -- Divide-and-Conquer Determinization of Büchi Automata based on SCC Decomposition -- Complementing Büchi Automata with Ranker -- Deductive Verication and Decision Procedures Even Faster Conicts and Lazier Reductions for String Solvers -- Local Search For SMT on Linear Integer Arithmetic -- Reasoning about Data Trees using CHCs -- Veried Erasure Correction in Coq with MathComp and VST -- Appel End-to-end Mechanised Proof of an eBPF Virtual Machine for Microcontrollers -- A DSL and Verication Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols -- Machine Learning Specication-Guided Learning of Nash Equilibria with High Social Welfare -- Synthesizing Fair Decision Trees via Iterative Constraint Solving -- SMT-based Translation Validation for Machine Learning Compiler -- Lee Verifying Fairness in Quantum Machine Learning -- MoGym: Using Formal Models for Training and Verifying Decision-making Agents -- Synthesis and Concurrency Synthesis and Analysis of Petri Nets from Causal Specications -- Verifying generalised and structural soundness of workow netsvia relaxations -- Capture, Analyze, Diagnose: Realizability Checking of Requirements in FRET -- Information Flow Guided Synthesis -- Randomized Synthesis for Diversity and Cost Constraints with Control Improvisation.…”
Link to Metadata
Electronic eBook -
665
Advances in Intelligent Data Analysis XVIII 18th International Symposium on Intelligent Data Analysis, IDA 2020, Konstanz, Germany, April 27-29, 2020, Proceedings /
Published 2020Table of Contents: “…Multivariate Time Series as Images: Imputation Using Convolutional Denoising Autoencoder -- Dual Sequential Variational Autoencoders for Fraud Detection -- A Principled Approach to Analyze Expressiveness and Accuracy of Graph Neural Networks -- Efficient Batch-Incremental Classification Using UMAP for Evolving Data Streams -- GraphMDL: Graph Pattern Selection Based on Minimum Description Length -- Towards Content Sensitivity Analysis -- Gibbs Sampling Subjectively Interesting Tiles -- Even Faster Exact k-Means Clustering -- Ising-Based Consensus Clustering on Special Purpose Hardware -- Transfer Learning by Learning Projections from Target to Source -- Computing Vertex-Vertex Dissimilarities Using Random Trees: Application to Clustering in Graphs -- Towards Evaluation of CNN Performance in Semantically Meaningful Latent Spaces -- Vouw: Geometric Pattern Mining Using the MDL Principle -- A Consensus Approach to Improve NMF Document Clustering -- Discriminative Bias for Learning Probabilistic Sentential Decision Diagrams -- Widening for MDL-Based Retail Signature Discovery -- Addressing the Resolution Limit and the Field of View Limit in Community Mining -- Estimating Uncertainty in Deep Learning for Reporting Confidence: An Application on Cell Type Prediction in Testes Based on Proteomics -- Adversarial Attacks Hidden in Plain Sight -- Enriched Weisfeiler-Lehman Kernel for Improved Graph Clustering of Source Code -- Overlapping Hierarchical Clustering (OHC) -- Digital Footprints of International Migration on Twitter -- Percolation-Based Detection of Anomalous Subgraphs in Complex Networks -- A Late-Fusion Approach to Community Detection in Attributed Networks -- Reconciling Predictions in the Regression Setting: an Application to Bus Travel Time Prediction -- A Distribution Dependent and Independent Complexity Analysis of Manifold Regularization -- Actionable Subgroup Discovery and Urban Farm Optimization -- AVATAR - Machine Learning Pipeline Evaluation Using Surrogate Model -- Detection ofDerivative Discontinuities in Observational Data -- Improving Prediction with Causal Probabilistic Variables -- DO-U-Net for Segmentation and Counting -- Enhanced Word Embeddings for Anorexia Nervosa Detection on Social Media -- Event Recognition Based on Classification of Generated Image Captions -- Human-to-AI Coach: Improving Human Inputs to AI Systems -- Aleatoric and Epistemic Uncertainty with Random Forests -- Master your Metrics with Calibration -- Supervised Phrase-Boundary Embeddings -- Predicting Remaining Useful Life with Similarity-Based Priors -- Orometric Methods in Bounded Metric Data -- Interpretable Neuron Structuring with Graph Spectral Regularization -- Comparing the Preservation of Network Properties by Graph Embeddings -- Making Learners (More) Monotone -- Combining Machine Learning and Simulation to a Hybrid Modelling Approach -- LiBRe: Label-Wise Selection of Base Learners in Binary Relevance for Multi-Label Classification -- Angle-Based Crowding Degree Estimation for Many-Objective Optimization.…”
Link to Metadata
Electronic eBook -
666
The Impact of Digital Technologies on Public Health in Developed and Developing Countries 18th International Conference, ICOST 2020, Hammamet, Tunisia, June 24-26, 2020, Proceeding...
Published 2020Table of Contents: “…IoT and AI Solutions for E-health -- Alzheimer's Disease Early Detection Using a Low Cost Three-dimensional Densenet-121 Architecture -- Self-adaptative Early Warning Scoring System for Smart Hospital -- Machine Learning Based Rank Attack Detection for Smart Hospital Infrastructure -- Remote Health Monitoring Systems Based on Bluetooth Low Energy (BLE) Communication Systems -- Modeling and Specification of Bootstrapping and Registration Design Patterns for IoT Applications -- Biomedical and Health Informatics -- EEG-based Hypo-vigilance Detection Using Convolutional Neural Network -- Respiratory Activity Classification Based on Ballistocardiogram Analysis -- A Convolutional Neural Network for Lentigo Diagnosis -- Deep Learning-based Approach for Atrial Fibrillation Detection -- Unsupervised Method Based on Superpixel Segmentation for Corpus Callosum Parcellation in MRI Scans -- Behavior and Activity Monitoring -- Using Learning Techniques to Observe Elderly's Behavior Changes Over Time -- Personalized and Contextualized Persuasion System for Older Adults' Physical Activity Promoting -- Baseline Modelling and Composite Representation of Unobtrusively (IoT) Sensed Behaviour Changes Related to Urban Physical Well-being -- Wellbeing Technology -- Automatic Daily Activity Schedule Planning for Simulating Smart House with Elderly People Living Alone -- A Novel On-wrist Fall Detection System Using Supervised Dictionary Learning Technique -- Combined Machine Learning and Semantic Modelling for Situation Awareness and Healthcare Decision Support -- Improving Access and Mental Health for Youth Through Virtual Models of Care -- Short Contributions: IoT and AI Solutions for E-health -- Study of Middleware for Internet of Healthcare Things and Their Applications -- Uncertainty in IoT for Smart Healthcare: Challenges, and Opportunities -- Secure E-health Platform -- Hybrid and Secure E-health Data Sharing Architecture in Multi-Clouds Environment -- Blockchain for Internet of Medical Things: A technical Review -- Application of Blockchain Technology in Healthcare: A Comprehensive Study -- Trust Execution Environment and Multi-party Computation for Blockchain E-health Systems -- A Fuzzy-ontology Based Diabetes Monitoring System Using Internet of Things -- Short Contributions: Biomedical and Health Informatics -- A Hybrid Approach for Heart Disease Diagnosis and Prediction Using Machine Learning Techniques -- Context-aware Healthcare Adaptation Model for COPD Diseases -- Study of Healthcare Professionals' Interaction in the Patient Records with Annotations -- Multirate ECG Processing and Machine Learning Based Efficient Arrhythmia Diagnosis -- Comparative Study of Relevant Methods for MRI/X Brain Image Registration -- Machine Learning Classification Models with SPD/ED Dataset: Comparative Study of Abstract Versus Full Article Approach -- Evaluation of Stationary Wavelet Transforms in Reconstruction of Pure High Frequency Oscillations (HFOs) -- Ensuring theCorrectness and Well Modeling of Intelligent Healthcare Management Systems -- Short Contributions: Wellbeing Technology -- An Embedded ANN Raspberry PI for Inertial Sensor Based Human Activity Recognition -- Human Activities Recognition in Android Smartphone using WSVM-HMM Classifier -- Mobile Assistive Application for Blind People in Indoor Navigation -- Older People's Needs and Opportunities for Assistive Technologies -- Towards a Formal Context-Aware Workflow Model for Ambient Environment -- The PULSE Project: A Case of Use of Big Data Uses Toward a Cohomprensive Health Vision of City Well Being -- ForeSight - An AI-driven Smart Living Platform, Approach to Add Access Control to openHAB.…”
Link to Metadata
Electronic eBook -
667
Debating European Citizenship
Published 2019Table of Contents: “….: Martin Wilhelm -- One Cannot Promote Free Movement of EU Citizens and Restrict Their Political Participation: Dora Kostakopoulou -- Second Country EU Citizens Voting in National Elections is an Important Step, but Other Steps Should be Taken First: Ángel Rodríguez -- A More Comprehensive Reform is Needed to Ensure that Mobile Citizens Can Vote: Sue Collard -- Incremental Changes are Not Enough - Voting Rights Are a Matter of Democratic Principle: Tony Venables -- Mobile Union Citizens Should Have Portable Voting Rights Within the EU: Roxana Barbulescu -- Concluding Remarks: Righting Democratic Wrongs: Philippe Cayla and Catriona Seth -- Part II: Freedom of Movement Under Attack: Is It Worth Defending as the Core of EU Citizenship?…”
Link to Metadata
Electronic eBook -
668
Debating Transformations of National Citizenship
Published 2018Table of Contents: “…Spiro -- Should Those Who Attack the Nation Have an Absolute Right to Remain Its Citizens?…”
Link to Metadata
Electronic eBook -
669
-
670
-
671
-
672
-
673
-
674
-
675
-
676
-
677
-
678
-
679
-
680