Zobrazeno 1 - 10
of 414
pro vyhledávání: '"QA076 Computer software"'
Autor:
Beyhan, Fatih, Çarık, Buse, Arın, İnanç, Terzioğlu, Ayşecan, Yanıkoğlu, Berrin, Yeniterzi, Reyyan
Social media posts containing hate speech are reproduced and redistributed at an accelerated pace, reaching greater audiences at a higher speed. We present a machine learning system for automatic detection of hate speech in Turkish, along with a hate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1246::86616d1f7865b5f5afdb6b8b2e93e574
http://www.lrec-conf.org/proceedings/lrec2022/pdf/2022.lrec-1.443.pdf
http://www.lrec-conf.org/proceedings/lrec2022/pdf/2022.lrec-1.443.pdf
Autor:
Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam El Fergougui
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networks, and extensively used in both academia and industry. Recent studies demonstrated that adversarial attacks against such models can maintain their ef
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::571185d673710ffd33e3d1909e77ac38
Autor:
Özbay, Cavit
Authentication and blacklisting mechanisms have a key role for service providers to deliver the service to correct users through digital channels. On the other hand, a user may reveal private data through the service, and an authentication/blacklisti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1246::2d7602ef45cb274e68935f4763c8d698
Autor:
Özerk, Özgün
In black-box penetration testing, a payload is a piece of code that potentially enables unauthorized access to a computer system through an exploit. Grouping payloads based on the behavior they trigger in the target application is a labor-intensive p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1246::f89c67e25652dd7d27864082b4de27d6
Autor:
Sermet, Barış
The rapid development of cyber technologies has made our life easier. Activities such as online banking, e-commerce and, social media have started to become a part of our lives; however, more threat surface has also emerged for attackers to leverage
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1246::94adc3025d59cbcdc6861bdb807280f6
Autor:
Polat, Yusuf Arslan
With the proliferation of “cyber-crime as a service” economy, besides gaining new victims, providing permanence on them has been one of the key points of profit for attackers. Thus, hiding malicious presence while operating is now more important
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1246::27dd302bd24b9d2cb30ae69154009072
An important concept in finite state machine based testing is synchronization which is used to initialize an implementation to a particular state. Usually, synchronizing sequences are used for this purpose and the length of the sequence used is impor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1cf48d02c1c9dfc241788aeb03a340cb
https://aperta.ulakbim.gov.tr/record/8337
https://aperta.ulakbim.gov.tr/record/8337
Publikováno v:
Applied Soft Computing. 49:1162-1174
Graphical abstractDisplay Omitted HighlightsThree methods for detecting a class of cache-based side-channel attacks are proposed.A new tool (quickhpc) for probing hardware performance counters at a higher temporal resolution than the existing tools i
Autor:
Ahmed, Sara Atito, Yanıkoğlu, Berrin
Face attributes classification is drawing attention as a research topic with applications in multiple domains, such as video surveillance and social media analysis. In this work, we propose to train attributes in groups based on their localization (h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1246::aabc0cd346a0628d275e318f432aff39
https://research.sabanciuniv.edu/id/eprint/38700/
https://research.sabanciuniv.edu/id/eprint/38700/