Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

An In-Depth Analysis Of Domain Adaptation In Computer And Robotic Vision, Muhammad Hassan Tanveer, Zainab Fatima, Shehnila Zardari, David A. Guerra-Zubiaga Nov 2023

An In-Depth Analysis Of Domain Adaptation In Computer And Robotic Vision, Muhammad Hassan Tanveer, Zainab Fatima, Shehnila Zardari, David A. Guerra-Zubiaga

Faculty and Research Publications

This review article comprehensively delves into the rapidly evolving field of domain adaptation in computer and robotic vision. It offers a detailed technical analysis of the opportunities and challenges associated with this topic. Domain adaptation methods play a pivotal role in facilitating seamless knowledge transfer and enhancing the generalization capabilities of computer and robotic vision systems. Our methodology involves systematic data collection and preparation, followed by the application of diverse assessment metrics to evaluate the efficacy of domain adaptation strategies. This study assesses the effectiveness and versatility of conventional, deep learning-based, and hybrid domain adaptation techniques within the domains of …


Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal May 2023

Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal

Master of Science in Computer Science Theses

The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …