Sökning: "Djupinlärningsmodeller"

Hittade 3 avhandlingar innehållade ordet Djupinlärningsmodeller.

  1. 1. Perspectives of Deep Learning for Neonatal Sepsis Detection

    Författare :Antoine Honoré; Saikat Chatterjee; Eric Herlenius; Guy Carrault; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Deep Learning; Neonatal Sepsis Detection; Normalizing Flows; Hidden Markov Models.; Djupinlärningsmodeller; Neonatal Sepsis detektion; Normaliserande Flöden; Dolda Markov modellerna.;

    Sammanfattning : Newborns, whether born at term or preterm, are highly vulnerable and face life-threatening situations during their initial weeks of life every year. Even with hospitalization in a neonatal intensive care unit (NICU) and careful clinical monitoring, identifying infection-related incidents like sepsis is a challenging task. LÄS MER

  2. 2. Source Code Representations of Deep Learning for Program Repair

    Författare :Zimin Chen; Martin Monperrus; Benoit Baudry; Zhendong Su; KTH; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Code Representation; Deep Learning; Program Repair; Datalogi; Computer Science;

    Sammanfattning : Deep learning, leveraging artificial neural networks, has demonstrated significant capabilities in understanding intricate patterns within data. In recent years, its prowess has been extended to the vast domain of source code, where it aids in diverse software engineering tasks such as program repair, code summarization, and vulnerability detection. LÄS MER

  3. 3. Deep Learning Side-Channel Attacks on Advanced Encryption Standard

    Författare :Huanyu Wang; Elena Dubrova; Mark Smith; Francesco Regazzoni; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Deep learning; Advanced Encryption Standard; Hardware security; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. LÄS MER