Essays about: "Labeled Data"

Showing result 21 - 25 of 312 essays containing the words Labeled Data.

  1. 21. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  2. 22. Applying Machine Learning Techniques for Anomaly Detection in Wooden Plank Images

    University essay from Uppsala universitet/Avdelningen Vi3

    Author : Iza Smedberg; [2023]
    Keywords : Anomaly Detection; Machine Vision; Machine Learning; Neural Network;

    Abstract : Anomaly detection is an important first step of quality control in manufacturing processes. In wooden planks, anomalies such as broken knots and resin pockets can lower the quality of the final product. With the help of machine vision, inspections can be made faster, at higher accuracy, and at a lower cost. READ MORE

  3. 23. Cell Identification from Microscopy Images using Deep Learning on Automatically Labeled Data

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Fredrik Salomon-Sörensen; [2023]
    Keywords : Deep Learning; Cell Identification; Image Segmentation; Nuclei Segmentation; Convolutional Neural Networks; UNet; Image Analysis; Microscopy; Noisy Labels; Phase-Contrast; Automatic Labeling; Technology and Engineering;

    Abstract : In biology, cell counting provides a fundamental metric for live-cell experiments. Unfortunately, most researchers are constrained to using tedious and invasive methods for counting cells. Automatic identification of cells in microscopy images would therefore be a valuable tool for such researchers. READ MORE

  4. 24. RNN-based Graph Neural Network for Credit Load Application leveraging Rejected Customer Cases

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Oskar Nilsson; Benjamin Lilje; [2023]
    Keywords : Machine Learning; Deep Learning; Reject Inference; GNN; GCN; Graph Neural Networks; RNN; Recursive Neural Network; LSTM; Semi-Supervised Learning; Encoding; Decoding; Feature Elimination;

    Abstract : Machine learning plays a vital role in preventing financial losses within the banking industry, and still, a lot of state of the art and industry-standard approaches within the field neglect rejected customer information and the potential information that they hold to detect similar risk behavior.This thesis explores the possibility of including this information during training and utilizing transactional history through an LSTM to improve the detection of defaults. READ MORE

  5. 25. Lights, Camera, BERT! : Autonomizing the Process of Reading andInterpreting Swedish Film Scripts

    University essay from Uppsala universitet/Datalogi

    Author : Leon Henzel; [2023]
    Keywords : NLP; Active Learning; Transformers; BERT;

    Abstract : In this thesis, the autonomization of extracting information from PDFs of Swedish film scriptsthrough various machine learning techniques and named entity recognition (NER) is explored.Furthermore, it is explored if labeled data needed for the NER tasks can be reduced to some degreewith the goal of saving time. READ MORE