Essays about: "artificial intelligence and network security"

Showing result 6 - 10 of 12 essays containing the words artificial intelligence and network security.

  1. 6. Privacy leaks from deep linear networks : Information leak via shared gradients in federated learning systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Guangze Shi; [2022]
    Keywords : Federated learning; Gradient share; Deep neural network; Information leak; Privacy and security; Maskininlärning med flera noder; Gradientdelning; Djupt neuralt nätverk; Informationsläcka; Integritetssäkerhet;

    Abstract : The field of Artificial Intelligence (AI) has always faced two major challenges. The first is that data is kept scattered and cannot be collected for more efficiently use. The second is that data privacy and security need to be continuously strengthened. READ MORE

  2. 7. Analysing user-friendly and knowledge-based agent solution for videostreams troubleshooting and management.

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Danielle Lundström; [2022]
    Keywords : AI chatbot; Knowledge-based agent; troubleshooting; management; multimedia services; QoS QoE;

    Abstract : Since the coronavirus pandemic in 2019, millions of people started to use online streaming and entertainment services during the lockdown. Streaming solutions such as OTT and IPTV has grown and boosted the live streaming and non-linear streaming revenue, by using new technologies and innovation such as Artificial Intelligence (AI) to improve the video quality, performance, and security of video streaming services. READ MORE

  3. 8. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor

    University essay from

    Author : Robert Danilovic; Måns Svensson; [2021]
    Keywords : Keystroke dynamics; Password security; Artificial Intelligence; Mobile application; Neural network; SVM; Gyroscope; Typing Characteristics;

    Abstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE

  4. 9. Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Fredrik Öberg; [2021]
    Keywords : Face Recognition; Presentation Attacks; Convolutional Neural Network;

    Abstract : Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. READ MORE

  5. 10. Exploring Spatiotemporal Relationships between InSAR-derived Land Subsidence and Satellite-based Hydrological Variables

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Yixin Zhang; [2021]
    Keywords : InSAR; Shabestar; subsidence; groundwater; hydrological variables; LSTM; Sentinel-1A; Geomatics; Technology and Engineering; Earth and Environmental Sciences;

    Abstract : Shabestar basin in the East Azerbaijan province, Northwest Iran, where irrigation is the main groundwater consumer, has experienced large-scale subsidence and groundwater deletion, which poses a threat to the local agricultural activities, economic development, and food security. With the emergency of mitigating the risk, satisfying future demand for groundwater, and improving resilience considering climate change, this study proposes a satellite-based approach to explore the spatio-temporal relationships between measured subsidence and hydrological variables in the basin to assist groundwater management strategy. READ MORE