Artificial Intelligence
We constructed datasets by extracting different features from Android Apk files, including permissions (official definition and customization), APIs and vulnerabilities. The datasets can be used for malware detection.
- Categories:
Blast furnace iron-making process (BFIP) is one of the most critical procedures in the iron and steel industry, in which timely detection and accurate classification of faults have always been of core focus. Nevertheless, due to the coupling effects of complex nonlinear and nonstationary characteristics hidden among the data, the consistent underlying information in the process cannot be accurately mined, hindering the establishment of the BFIP fault diagnosis model.
- Categories:
The C3I Synthetic Human Dataset provides 48 female and 84 male synthetic 3D humans in fbx format generated from iClone 7 Character creator “Realistic Human 100” toolkit with variations in ethnicity, gender, race, age, and clothing. For each of these, it further provides the full-body model with five different facial expressions – Neutral, Angry, Sad, Happy, and Scared. Along with the body models, it also open-sources a data generation pipeline written in python to bring those models into a 3D Computer Graphics tool called Blender.
- Categories:
Data for neural networks.
Magnetic flux intensity - input
The real pose of a single magnet - output
- Categories:
Code example for Rethink, Revisit, Revise: A Spiral Reinforced Self-Revised Network for Zero-Shot Learning
- Categories:
The picture shows the operation result of image security retrieval. The experiment was validated on five common data sets.
- Categories:
"128_dim_word_vector" is the word vector that is used in 2.2.1. "86 keywords" is used to extract directive sentences in section 3.1.1. "constructed_KG and source_of_data" contains the constructed API-Task KG and source of data used in constructed KG. ”Experiment RQ_1 and RQ_2" is the experiment data. "Empirical_study" contains the Stack Overflow questions that are used in the empirical study.
- Categories:
Anonymous network traffic is more pervasive than ever due to the accessibility of services such as virtual private networks (VPN) and The Onion Router (Tor). To address the need to identify and classify this traffic, machine and deep learning solutions have become the standard. However, high-performing classifiers often scale poorly when applied to real-world traffic classification due to the heavily skewed nature of network traffic data.
- Categories: