Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 627-646 av 2537
-
Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
(Peer reviewed; Journal article, 2023)Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks ... -
Deep Face Age Progression: A Survey
(Peer reviewed; Journal article, 2021) -
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace
(Peer reviewed; Journal article, 2021)Due to the severe threat to cyberspace security, detection of online spammers has been a universal concern of academia. Nowadays, prevailing literature of this field almost leveraged various relations to enhance feature ... -
Deep Learning Algorithms in Health Area: Adversarial Attacks and Countermeasures
(Master thesis, 2021)Nowadays, in the health area, Artificial Intelligence (AI) becomes a must-have to improve diagnosis and prognosis quality. Thus, the medical corps can use Deep Learning (DL) algorithms to predict the evolution of diseases, ... -
Deep Learning Algorithms in Health Area: Adversarial Attacks and Countermeasures
(Master thesis, 2021)Nowadays, in the health area, Artificial Intelligence (AI) becomes a must-have to improve diagnosis and prognosis quality. Thus, the medical corps can use Deep Learning (DL) algorithms to predict the evolution of diseases, ... -
Deep Learning Based Approaches for Financial Fraud Detection
(Master thesis, 2020)Oppdagelse av økonomisk svindel er et irriterende problem som tar finansinstitusjoner mye penger og energi for å redusere tapet forårsaket av det. Tradisjonelle metoder for oppdagelse av svindel trenger mye trent revisjoner ... -
Deep learning based Sequential model for malware analysis using Windows exe API Calls
(Peer reviewed; Journal article, 2020)Malware development has seen diversity in terms of architecture and features. This advancement in the competencies of malware poses a severe threat and opens new research dimensions in malware detection. This study is ... -
Deep Learning for Fingerprint Recognition Systems
(Doctoral theses at NTNU;2019:242, Doctoral thesis, 2019)Summary Biometric recognition is a typical means to identify individuals or to verify claimed identities. Use cases are manifold. For example, users can unlock their smartphones for convenience by presenting their faces ... -
Deep learning in health systems: An analysis of adversarial attacks on convolutional neural networks
(Master thesis, 2022)Det siste tiårets utvikling av kovolusjonelle nevrale nettverk has revolusjonert bildegjenkjenningsfagfeltet innen kunstig intelligens. Innen helse har nye dype nevrale nettverk blitt vist å gjenkjenne diagnoser bedre enn ... -
Deep Learning Techniques for Face Image Quality Estimation
(Master thesis, 2018)Biometric authentication using fingerprints or face recognition is becoming mainstream, and there is a need to make these methods as secure and reliable as possible. One way to achieve better performance with a biometric ... -
Deep Packet Inspection Bypass
(Master thesis, 2015)Internet censorship is a problem, where governments and authorities restricts access to what the public can read on the Internet. They use deep packet inspection tools to conduct the censorship. An example of such a tool ... -
Deep-STRESS Capsule Video Endoscopy Image Enhancement
(Journal article; Peer reviewed, 2018)This paper proposes a unified framework for capsule video endoscopy image enhancement with an objective to enhance the diagnostic values of these images. The proposed method is based on a hybrid approach of deep learning ... -
DEEPMATCH2: A comprehensive deep learning-based approach for in-vehicle presence detection
(Journal article; Peer reviewed, 2021)The accurate detection of the mobile context information of public transportation vehicles and their passengers is a key feature to realize intelligent transportation systems. A topical example is in-vehicle presence ... -
Deepthought - A Case Study in Digital Forensic Tool Validation
(Master thesis, 2019)Bevis fra digitale enheter spiller en stadig større rolle i etterforskning av kriminalsaker. Spesialverktøyene som brukes til å sikre og hente ut bevis må være nøyaktige og påvirke de beslaglagte enhetene så lite som mulig. ... -
DeepTMA: Predicting Effective Contention Models for Network Calculus using Graph Neural Networks
(Journal article; Peer reviewed, 2019)Network calculus computes end-to-end delay bounds for individual data flows in networks of aggregate schedulers. It searches for the best model bounding resource contention between these flows at each scheduler. Analyzing ... -
Defending End-to-End Confirmation Attacks against the Tor Network
(Master thesis, 2015)Tor is an anonymity network designed for interactive applications such as Web browsing or instant messaging. The network consists of voluntarily operated nodes distributed around the world and routes user traffic over three ... -
Defining and measuring the effects of digital technologies on social sustainability: A systematic literature review
(Peer reviewed; Journal article, 2023) -
Definition of QoE Fairness in Shared Systems
(Journal article; Peer reviewed, 2016)User-centric service and application management focuses on the Quality of Experience (QoE) as perceived by the end user. Thereby, the goal is to maximize QoE while ensuring fairness among users, e.g., for resource allocation ... -
Definitions for Plaintext-Existence Hiding in Cloud Storage
(ARES 2018;Article No. 41, Chapter, 2018)Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client side, leaking information ...