Zobrazeno 1 - 10
of 14 262
pro vyhledávání: '"Stamp AS"'
Autor:
Khadilkar, Atharva, Stamp, Mark
In recent years, the use of image-based techniques for malware detection has gained prominence, with numerous studies demonstrating the efficacy of deep learning approaches such as Convolutional Neural Networks (CNN) in classifying images derived fro
Externí odkaz:
http://arxiv.org/abs/2412.08514
Autor:
Kulkarni, Maithili, Stamp, Mark
Android malware detection based on machine learning (ML) and deep learning (DL) models is widely used for mobile device security. Such models offer benefits in terms of detection accuracy and efficiency, but it is often difficult to understand how su
Externí odkaz:
http://arxiv.org/abs/2411.16817
Autor:
Stamp, P. C. E., Silevitch, D. M., Libersky, M., McKenzie, Ryan, Geim, A. A., Rosenbaum, T. F.
Publikováno v:
Phys. Rev. B 110, 134420 (2024)
We examine the low-energy excitations in the vicinity of the quantum critical point in LiHoF$_4$, a physical realization of the Transverse Field Ising Model, focusing on the long-range fluctuations which soften to zero energy at the ferromagnetic qua
Externí odkaz:
http://arxiv.org/abs/2408.03510
There have been many recent advances in the fields of generative Artificial Intelligence (AI) and Large Language Models (LLM), with the Generative Pre-trained Transformer (GPT) model being a leading "chatbot." LLM-based chatbots have become so powerf
Externí odkaz:
http://arxiv.org/abs/2408.04647
Autor:
Zhu, P. C. E. Stamp Zhen
We solve for the decoherence dynamics of two models in which a simple qubit or Central Spin couples to a bath of spins; the bath is made from a chain of spins. In model 1, the bath spins are Ising spins; in Model 2, they are coupled by transverse spi
Externí odkaz:
http://arxiv.org/abs/2405.03795
Malware attacks have become significantly more frequent and sophisticated in recent years. Therefore, malware detection and classification are critical components of information security. Due to the large amount of malware samples available, it is es
Externí odkaz:
http://arxiv.org/abs/2405.03298
Publikováno v:
Expert Systems with Applications, Volume 125, 1 July 2019, Pages 130-141
In recent years there has been a dramatic increase in the number of malware attacks that use encrypted HTTP traffic for self-propagation or communication. Antivirus software and firewalls typically will not have access to encryption keys, and therefo
Externí odkaz:
http://arxiv.org/abs/2312.04596
Bot activity on social media platforms is a pervasive problem, undermining the credibility of online discourse and potentially leading to cybercrime. We propose an approach to bot detection using Generative Adversarial Networks (GAN). We discuss how
Externí odkaz:
http://arxiv.org/abs/2311.05079
An interesting idea, dating back to Feynman, argues that quantum mechanics may break down for large masses if one entertains the possibility that gravity can be "classical", thereby leading to predictions different from conventional low-energy quantu
Externí odkaz:
http://arxiv.org/abs/2311.02033
Autor:
Marleen Balvert, Johnathan Cooper-Knock, Julian Stamp, Ross P. Byrne, Soufiane Mourragui, Juami van Gils, Stefania Benonisdottir, Johannes Schlüter, Kevin Kenna, Sanne Abeln, Alfredo Iacoangeli, Joséphine T. Daub, Brian L. Browning, Gizem Taş, Jiajing Hu, Yan Wang, Elham Alhathli, Calum Harvey, Luna Pianesi, Sara C. Schulte, Jorge González-Domínguez, Erik Garrisson, Lorentz workshop on epistasis, Michael P. Snyder, Alexander Schönhuth, Letitia M. F. Sng, Natalie A. Twine
Publikováno v:
Genome Biology, Vol 25, Iss 1, Pp 1-17 (2024)
Abstract Epistasis refers to changes in the effect on phenotype of a unit of genetic information, such as a single nucleotide polymorphism or a gene, dependent on the context of other genetic units. Such interactions are both biologically plausible a
Externí odkaz:
https://doaj.org/article/b474a576126e4691988acae1b1be2c19