Search

Results: 3
A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs)
Recently, due to the advance and impressive results of deep learning techniques in the fields of image recognition, natural language processing and speech recognition for various long-standing artificial intelligence (AI) tasks...
Published by: IGI Global
Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud
Visitor validation at entrance generates a large number of image files that need to be transmitted over to cloud for future reference. The image data needs to be protected by active and passive adversaries from performing...
Published by: IGI Global