Machine Learning
M. Kacmajor and J.D. Kelleher, "ExTra: Evaluation of Automatically Generated Source Code Using Execution Traces" (submitted to IEEE TSE)
- Categories:
M. Kacmajor and J.D. Kelleher, "ExTra: Evaluation of Automatically Generated Source Code Using Execution Traces" (submitted to IEEE TSE)
- Categories:
To provide machine learning and data science experts with a more robust dataset for model training, the well-known Palmer Penguins dataset has been expanded from its original 344 rows to 100,000 rows. This substantial increase was achieved using an adversarial random forest technique, effectively generating additional synthetic data while maintaining key patterns and features. The method achieved an impressive accuracy of 88%, ensuring the expanded dataset remains realistic and suitable for classification tasks.
- Categories:
Jamming devices present a significant threat by disrupting signals from the global navigation satellite system (GNSS), compromising the robustness of accurate positioning. The detection of anomalies within frequency snapshots is crucial to counteract these interferences effectively. A critical preliminary measure involves the reliable classification of interferences and characterization and localization of jamming devices.
- Categories:
This dataset offers both Channel State Information (CSI) and Beamforming Feedback Information (BFI) data for human activity classification, featuring 20 distinct activities performed by three subjects across three environments. Collected in both line-of-sight (LoS) and non-line-of-sight (NLoS) scenarios, this dataset enables researchers to explore the complementary roles of CSI and BFI in activity recognition and environmental characterization.
- Categories:
This dataset enables advanced Wi-Fi sensing applications, including multi-subject monitoring for home surveillance, remote healthcare, and entertainment. It focuses on Beamforming Feedback Information (BFI) as a proxy for Channel State Information (CSI), eliminating the need for firmware modifications and enabling single-capture data collection across multiple channels between an access point (AP) and stations (STAs).
- Categories:
As various modalities of genomic data are accumulating, methods to integrate across multi-omics datasets are becoming important. Error-correcting output codes (ECOC) is an ensemble learning strategy for solving a multiclass problem thru a decoding process that aggregates the predictions of multiple classifiers. Thus, it lends itself naturally to aggregating predictions across multiple views as well. We applied the ECOC to multi-view learning to see if this strategy can enhance classifier performance as compared to traditional techniques.
- Categories:
Jamming devices pose a significant threat by disrupting signals from the global navigation satellite system (GNSS), compromising the robustness of accurate positioning. Detecting anomalies in frequency snapshots is crucial to counteract these interferences effectively. The ability to adapt to diverse, unseen interference characteristics is essential for ensuring the reliability of GNSS in real-world applications. We recorded a dataset with our own sensor station at a German highway with two interference classes and one non-interference class.
- Categories:
Hyperthermia is a thermal treatment for cancer which kills cancer cells by applying heat. Among different heating approaches, magnetic hyperthermia uses heat generation of magnetic nanoparticles to achieve local treatment. Magnetic nanoparticles induce heat when stimulated by an alternating magnetic field, and the heating efficiency depends on multiple parameters including magnetic properties of magnetic nanoparticles and magnetic field used to stimulate the nanoparticles.
- Categories:
This dataset contains original and augmented versions of the Korean Call Content Vishing (KorCCVi v2) dataset used in the study titled, "Enhancing Voice Phishing Detection Using Multilingual Back-Translation and SMOTE: An Empirical Study." The dataset addresses challenges of data imbalance and asymmetry in Korean voice phishing detection, leveraging data augmentation techniques such as multilingual back-translation (BT) with English, Chinese, and Japanese as intermediate languages, and Synthetic Minority Oversampling Technique (SMOTE).
- Categories: