Paul E Black,Monika Singh
Paul E Black
Can deep learning save us and itself from the avalanche of threats in cyberspace? [0.03%]
深度学习能否拯救我们在网空中的种种威胁?
Apostol Vassilev
Apostol Vassilev
How to model and encode the semantics of human-written text and select the type of neural network to process it are not settled issues in sentiment analysis. Accuracy and transferability are critical issues in machine learning in general an...
On the Effectiveness of Deep Representation Learning: the Atrial Fibrillation Case [0.03%]
深度表示学习的有效性:房颤案例分析
Matteo Gadaleta,Michele Rossi,Eric J Topol et al.
Matteo Gadaleta et al.
The automatic and unsupervised analysis of biomedical time series is of primary importance for diagnostic and preventive medicine, enabling fast and reliable data processing to reveal clinical insights without the need for human interventio...
No Phishing beyond This Point [0.03%]
从此莫要钓鱼网诱用户在此zych注:此题目为幽默讽刺文,作者在文中使用各种手法模仿网络钓鱼邮件。由于“phish”一词和“fish”同源,在网络钓鱼中翻译为“钓鱼”,但是在鱼缸、钓鱼等其他语境下可以翻译为“钓鱼”。标题用了路牌的隐喻,因此采用中文口语化的表达方式。
Kristen Greene,Michelle Steves,Mary Theofanos
Kristen Greene
As phishing continues to evolve, what's your organization doing to stay off the hook?
A Navigational Approach to Health: Actionable Guidance for Improved Quality of Life [0.03%]
导航式健康:提升生活质量的操作性指导方法
Nitish Nag,Ramesh Jain
Nitish Nag
Health and well-being are shaped by how lifestyle and the environment interact with biological machines. A navigational paradigm can help users reach a specific health goal by using constantly captured measurements to estimate how their hea...
Vincent C Hu,D Richard Kuhn,David F Ferraiolo
Vincent C Hu
Technologies such as BigData, Cloud, Grid, and IoT are reshaping current data systems and practices, and IT experts are just as keen on harnessing the power of distributed systems to boost security and prevent fraud. How can massive distrib...
Apostol Vassilev,Nicky Mouha,Luís Brandão
Apostol Vassilev
The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradi...
Alexa, Can I Trust You? [0.03%]
艾丽卡,我可以信赖你吗?
Hyunji Chung,Michaela Iorga,Jeffrey Voas et al.
Hyunji Chung et al.
Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA) - diagnostics offer the possibility of securer IVA ecosystems.
J Voas,R Kuhn
J Voas
Peter Bajcsy,Antoine Vandecreme,Julien Amelot et al.
Peter Bajcsy et al.
Microscopy could be an important tool for characterizing stem cell products if quantitative measurements could be collected over multiple spatial and temporal scales. With the cells changing states over time and being several orders of magn...