Zobrazeno 1 - 10
of 29 038
pro vyhledávání: '"A, Cherif"'
The advent of next-generation radio interferometers like the Square Kilometer Array promises to revolutionise our radio astronomy observational capabilities. The unprecedented volume of data these devices generate requires fast and accurate image rec
Externí odkaz:
http://arxiv.org/abs/2410.23178
Autor:
Tihanyi, Norbert, Bisztray, Tamas, Dubniczky, Richard A., Toth, Rebeka, Borsos, Bertalan, Cherif, Bilel, Ferrag, Mohamed Amine, Muzsai, Lajos, Jain, Ridhi, Marinelli, Ryan, Cordeiro, Lucas C., Debbah, Merouane
As machine intelligence evolves, the need to test and compare the problem-solving abilities of different AI models grows. However, current benchmarks are often overly simplistic, allowing models to perform uniformly well, making it difficult to disti
Externí odkaz:
http://arxiv.org/abs/2410.15490
Publikováno v:
2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM)
This review paper provides a comprehensive analysis of recent advances in automatic speech recognition (ASR) with bidirectional encoder representations from transformers BERT and connectionist temporal classification (CTC) transformers. The paper fir
Externí odkaz:
http://arxiv.org/abs/2410.09456
Autor:
Kim, Dae-Yun, Berrai, Imane, Suraj, T. S., Roussigne, Yves, Yang, Shuhan, Belmeguenai, Mohamed, Hu, Fanrui, Shi, Guoyi, Tan, Hui Ru, Huang, Jifei, Soumyanarayanan, Anjan, Kim, Kyoung-Whan, Cherif, Salim Mourad, Yang, Hyunsoo
Chiral magnets have garnered significant interest due to the emergence of unique phenomena prohibited in inversion-symmetric magnets. While the equilibrium characteristics of chiral magnets have been extensively explored through the Dzyaloshinskii-Mo
Externí odkaz:
http://arxiv.org/abs/2409.04713
Autor:
Monnin, Pierre, Nousradine, Cherif-Hassan, Jarnac, Lucas, Zuckerman, Laurel, Couceiro, Miguel
Knowledge graphs (KGs) have become ubiquitous publicly available knowledge sources, and are nowadays covering an ever increasing array of domains. However, not all knowledge represented is useful or pertaining when considering a new application or sp
Externí odkaz:
http://arxiv.org/abs/2408.14658
Autor:
Rashidi, A., Yahia, H., Bontemps, S., Schneider, N., Bonne, L., Hennebelle, P., Scholtys, J., Attuel, G., Turiel, A., Simon, R., Cailly, A., Zebadua, A., Cherif, A., Lacroix, C., Martin, M., Aouni, A. El, Sakka, C., Maji, S. K.
Publikováno v:
Astronomy & Astrophysics 2024
We present significant improvements to our previous work on noise reduction in {\sl Herschel} observation maps by defining sparse filtering tools capable of handling, in a unified formalism, a significantly improved noise reduction as well as a decon
Externí odkaz:
http://arxiv.org/abs/2406.00893
Publikováno v:
2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM)
The rise of new complex attacks scenarios in Internet of things (IoT) environments necessitate more advanced and intelligent cyber defense techniques such as various Intrusion Detection Systems (IDSs) which are responsible for detecting and mitigatin
Externí odkaz:
http://arxiv.org/abs/2405.20038
Protecting Internet of things (IoT) devices against cyber attacks is imperative owing to inherent security vulnerabilities. These vulnerabilities can include a spectrum of sophisticated attacks that pose significant damage to both individuals and org
Externí odkaz:
http://arxiv.org/abs/2405.18624
Autor:
Lee, Seanie, Kim, Minsu, Cherif, Lynn, Dobre, David, Lee, Juho, Hwang, Sung Ju, Kawaguchi, Kenji, Gidel, Gauthier, Bengio, Yoshua, Malkin, Nikolay, Jain, Moksh
Red-teaming, or identifying prompts that elicit harmful responses, is a critical step in ensuring the safe and responsible deployment of large language models (LLMs). Developing effective protection against many modes of attack prompts requires disco
Externí odkaz:
http://arxiv.org/abs/2405.18540
Autor:
Ferrag, Mohamed Amine, Alwahedi, Fatima, Battah, Ammar, Cherif, Bilel, Mechri, Abdechakour, Tihanyi, Norbert
This paper provides a comprehensive review of the future of cybersecurity through Generative AI and Large Language Models (LLMs). We explore LLM applications across various domains, including hardware design security, intrusion detection, software en
Externí odkaz:
http://arxiv.org/abs/2405.12750