Zobrazeno 1 - 10
of 5 397
pro vyhledávání: '"Shaer A"'
We present a novel approach for test-time adaptation via online self-training, consisting of two components. First, we introduce a statistical framework that detects distribution shifts in the classifier's entropy values obtained on a stream of unlab
Externí odkaz:
http://arxiv.org/abs/2408.07511
Autor:
Ch, Nabil Al Nahin, Fortier, Jared, Janssen, Christian P., Shaer, Orit, Mills, Caitlin, Kun, Andrew L.
In this study, we focus on different strategies drivers use in terms of interleaving between driving and non-driving related tasks (NDRT) while taking back control from automated driving. We conducted two driving simulator experiments to examine how
Externí odkaz:
http://arxiv.org/abs/2408.05286
Autor:
Shaer, Ibrahim, Shami, Abdallah
Cyber-security attacks pose a significant threat to the operation of autonomous systems. Particularly impacted are the Heating, Ventilation, and Air Conditioning (HVAC) systems in smart buildings, which depend on data gathered by sensors and Machine
Externí odkaz:
http://arxiv.org/abs/2403.13023
The hyper-parameter optimization (HPO) process is imperative for finding the best-performing Convolutional Neural Networks (CNNs). The automation process of HPO is characterized by its sizable computational footprint and its lack of transparency; bot
Externí odkaz:
http://arxiv.org/abs/2403.12237
The growing availability of generative AI technologies such as large language models (LLMs) has significant implications for creative work. This paper explores twofold aspects of integrating LLMs into the creative process - the divergence stage of id
Externí odkaz:
http://arxiv.org/abs/2402.14978
The Common Vulnerabilities and Exposures (CVE) are pivotal information for proactive cybersecurity measures, including service patching, security hardening, and more. However, CVEs typically offer low-level, product-oriented descriptions of publicly
Externí odkaz:
http://arxiv.org/abs/2309.03040
Autor:
Aghaei, Ehsan, Al-Shaer, Ehab
This paper addresses a critical challenge in cybersecurity: the gap between vulnerability information represented by Common Vulnerabilities and Exposures (CVEs) and the resulting cyberattack actions. CVEs provide insights into vulnerabilities, but of
Externí odkaz:
http://arxiv.org/abs/2309.02785
Publikováno v:
Open Veterinary Journal, Vol 14, Iss 10, Pp 2572-2586 (2024)
Background: The global demand for fish and fish products has increased due to population growth and healthier food choices. However, bacterial infections caused by Aeromonas species pose a challenge. Antibiotics are crucial for disease control, but m
Externí odkaz:
https://doaj.org/article/b273d12da8124fa18e2e32a6defc3bc6
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-15 (2024)
Abstract Zinc Oxide (ZnO) nanorods have great potential in several applications including gas sensors, light-emitting diodes, and solar cells because of their unique properties. Here, three low cost and ecofriendly techniques were used to produce ZnO
Externí odkaz:
https://doaj.org/article/d56417d1bbcb4ea5977a2bc4243967f9
Autor:
Shaer, Ibrahim, Shami, Abdallah
Publikováno v:
IEEE Transactions on Network and Service Management, vol. 20, no. 2, pp. 1543-1557, June 2023
The Federated Learning (FL) paradigm faces several challenges that limit its application in real-world environments. These challenges include the local models' architecture heterogeneity and the unavailability of distributed Internet of Things (IoT)
Externí odkaz:
http://arxiv.org/abs/2307.12149