Artificial Intelligence
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
Data for neural networks.
Magnetic flux intensity - input
The real pose of a single magnet - output
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
Code example for Rethink, Revisit, Revise: A Spiral Reinforced Self-Revised Network for Zero-Shot Learning
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
The picture shows the operation result of image security retrieval. The experiment was validated on five common data sets.
- Categories:
"128_dim_word_vector" is the word vector that is used in 2.2.1. "86 keywords" is used to extract directive sentences in section 3.1.1. "constructed_KG and source_of_data" contains the constructed API-Task KG and source of data used in constructed KG. ”Experiment RQ_1 and RQ_2" is the experiment data. "Empirical_study" contains the Stack Overflow questions that are used in the empirical study.
- Categories:
Anonymous network traffic is more pervasive than ever due to the accessibility of services such as virtual private networks (VPN) and The Onion Router (Tor). To address the need to identify and classify this traffic, machine and deep learning solutions have become the standard. However, high-performing classifiers often scale poorly when applied to real-world traffic classification due to the heavily skewed nature of network traffic data.
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
Measuring the appearance time slots of characters in videos is still an unsolved problem in computer vision, and the related dataset is insufficient and unextracted. The Character Face In Video (CFIV) dataset provides the labeled appearing time slots for characters of interest for ten video clips on Youtube, two faces per character for training, and a script for downloading each video. Additionally, three videos contain around 100 images per character for evaluating the accuracy of the face recognizer.
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
Traffic data set
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
This dataset accurately models the internal behavior of an IoT spectrum sensor (belonging to the ElectroSense platform and consisting of a Raspberry Pi 3 with a software-defined radio kit) when it is functioning normally and under attack. To accomplish it, the system calls of the IoT sensor are monitored under normal behavior, gathered, cleaned, and stored in a centralized directory. Then, the device is infected with current malware affecting IoT devices, such as the Bashlite botnet, Thetick backdoor, Bdvl rootkit, and a Ransomware proof of concept.
- Categories: