Electric vehicle user behavior: An analysis of charging station utilization in Canada
For a user-centered deployment of electric vehicle supply equipment (EVSE) infrastructure, it
is vital to understand electric vehicle user charging behavior. This study identifies user …
is vital to understand electric vehicle user charging behavior. This study identifies user …
A Label Flipping Attack on Machine Learning Model and Its Defense Mechanism
Q Li, X Wang, F Wang, C Wang - International Conference on Algorithms …, 2022 - Springer
Recently, the robustness of machine learning against data poisoning attacks is widely
concerned. As a subclass of poisoning attack, the label flipping attack can poison training …
concerned. As a subclass of poisoning attack, the label flipping attack can poison training …
[PDF][PDF] Anomaly Detection for Cloud Systems with Dynamic Spatiotemporal Learning.
M Yu, X Zhang - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
As cloud system architectures evolve continuously, the interactions among distributed
components in various roles become increasingly complex. This complexity makes it difficult …
components in various roles become increasingly complex. This complexity makes it difficult …
[PDF][PDF] CLAM-Accelerated K-Nearest Neighbors Entropy-Scaling Search of Large High-Dimensional Datasets via an Actualization of the Manifold Hypothesis
ME Prior, TJ Howard III, O McLaughlin, N Ishaq… - arXiv preprint arXiv …, 2023 - arxiv.org
Many fields are experiencing a Big Data explosion, with data collection rates outpacing the
rate of computing performance improvements predicted by Moore's Law. Researchers are …
rate of computing performance improvements predicted by Moore's Law. Researchers are …
Extracting Spatiotemporal Features For Detecting the Beginning of a Network Layer Attack with a Graph Neural Autoencoder and Deep Metric Learning
M Yadav, P Hawrylak - 2024 Cyber Awareness and Research …, 2024 - ieeexplore.ieee.org
Detection and mitigation of ongoing network layer attacks from real-time network traffic data
is essential for normal operations and availability of the interconnected devices in a network …
is essential for normal operations and availability of the interconnected devices in a network …
Structure Design of Log Management Platform That Supports Smooth Expansion of Anomaly Detection Capability
H Gan, H Du, Y Cao - Proceedings of the 2022 10th International …, 2022 - dl.acm.org
With the popularity of cloud services and more and more traditional businesses on the cloud,
the log management platform as an important cloud service is suffering from the impact of …
the log management platform as an important cloud service is suffering from the impact of …
Anomaly Detection Algorithms for Low-Dimensional and High-Dimensional Data: A Critical Study
Suspicious events or objects that differ from the norm in data can be discovered using
anomaly identification. Identifying anomalies is critical for many applicable domains of life …
anomaly identification. Identifying anomalies is critical for many applicable domains of life …
Visualization of High Dimensional Data in Low Dimensional Space Via Clustered Manifold Mapping
D Perrone - 2024 - search.proquest.com
Visualizing high dimensional data can be a challenging task due to the difficulty people face
in comprehending information beyond three dimensions. Further research and development …
in comprehending information beyond three dimensions. Further research and development …
Vorschlagen von Datenvalidierungsmethoden für loT-Daten mithilfe von Kontextmodellen
A Aßenmacher - 2023 - elib.uni-stuttgart.de
Das Internet of Things wird mittlerweile in vielen Bereichen wie Smart Homes, Smart
Hospitals oder der Industrie 4.0 eingesetzt. Mit Hilfe von modellgetriebener Entwicklung …
Hospitals oder der Industrie 4.0 eingesetzt. Mit Hilfe von modellgetriebener Entwicklung …