期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
IBM语音识别能力逼近人类水平 获深度学习巨头Yoshua Bengio盛赞
1
《大数据时代》 2017年第2期74-75,共2页
人类每听20个词,就有一两个成为'漏网之鱼',而在一段五分钟的对话中,这一数字达到了80。对于我们而言,少听一两个词并不会影响我们对语意的理解,然而计算机要完成这件事有多难?2016年,IBM在语音识别领域走到了一个新的里程碑,... 人类每听20个词,就有一两个成为'漏网之鱼',而在一段五分钟的对话中,这一数字达到了80。对于我们而言,少听一两个词并不会影响我们对语意的理解,然而计算机要完成这件事有多难?2016年,IBM在语音识别领域走到了一个新的里程碑,系统的错误率降低为6.9%,近日,IBM Watson的语音识别系统将这个数字降到了5.5%。在合作伙伴Appen的协作下,IBM重新对语音识别系统进行调整。 展开更多
关键词 IBM 语音识别 Yoshua bengio
在线阅读 下载PDF
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
2
作者 Mahima Dahiya Nitin Nitin 《Computers, Materials & Continua》 SCIE EI 2023年第2期4183-4201,共19页
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara... Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods. 展开更多
关键词 Cyber security data mining intrusion detection system(DataMIDS) marginal likelihood fisher information matrix(MLFIM) absolute median deviation based robust scalar(AMD-RS) functional perturbation(FP) inverse chi square based flamingo search optimization(ICS-FSO) hyperparameter tuned threshold based decision tree(HpTT-DT) Xavier normal distribution based relief(XavND-relief) and bengio Nesterov momentum-based tuned generative adversarial network(BNM-tGAN)
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部