Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    A Performance Study of Membership Inference Attacks on Different Machine Learning Algorithms

    Jumana Alsubhi1, Abdulrahman Gharawi1, Mohammad Alahmadi2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 193-200, 2021, DOI:10.32604/jihpp.2021.027871

    Abstract Nowadays, machine learning (ML) algorithms cannot succeed without the availability of an enormous amount of training data. The data could contain sensitive information, which needs to be protected. Membership inference attacks attempt to find out whether a target data point is used to train a certain ML model, which results in security and privacy implications. The leakage of membership information can vary from one machine-learning algorithm to another. In this paper, we conduct an empirical study to explore the performance of membership inference attacks against three different machine learning algorithms, namely, K-nearest neighbors, random forest, support vector machine, and logistic… More >

  • Open Access

    RETRACTION

    RETRACTED: Recent Approaches for Text Summarization Using Machine Learning & LSTM0

    Neeraj Kumar Sirohi1,*, Mamta Bansal1, S. N. Rajan2

    Journal on Big Data, Vol.3, No.1, pp. 35-47, 2021, DOI:10.32604/jbd.2021.015954

    Abstract Nowadays, data is very rapidly increasing in every domain such as social media, news, education, banking, etc. Most of the data and information is in the form of text. Most of the text contains little invaluable information and knowledge with lots of unwanted contents. To fetch this valuable information out of the huge text document, we need summarizer which is capable to extract data automatically and at the same time capable to summarize the document, particularly textual text in novel document, without losing its any vital information. The summarization could be in the form of extractive and abstractive summarization. The… More >

  • Open Access

    ARTICLE

    Gender Recognition Based on Computer Vision System

    Li-Hong Juanga, Ming-Ni Wub, Shin-An Linb

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 249-256, 2018, DOI:10.1080/10798587.2016.1272777

    Abstract Detecting human gender from complex background, illumination variations and objects under computer vision system is very difficult but important for an adaptive information service. In this paper, a preliminary design and some experimental results of gender recognition will be presented from the walking movement that utilizes the gait-energy image (GEI) with denoised energy image (DEI) pre-processing as a machine learning support vector machine (SVM) classifier to train and extract its characteristics. The results show that the proposed method can adopt some characteristic values and the accuracy can reach up to 100% gender recognition rate under combining the horizontal added vertical… More >

  • Open Access

    ARTICLE

    Surgical Outcome Prediction in Total Knee Arthroplasty Using Machine Learning

    Belayat Hossaina, Takatoshi Morookab, Makiko Okunob, Manabu Niia, Shinichi Yoshiyab, Syoji Kobashia

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 105-115, 2019, DOI:10.31209/2018.100000034

    Abstract This work aimed to predict postoperative knee functions of a new patient prior to total knee arthroplasty (TKA) surgery using machine learning, because such prediction is essential for surgical planning and for patients to better understand the TKA outcome. However, the main difficulty is to determine the relationships among individual varieties of preoperative and postoperative knee kinematics. The problem was solved by constructing predictive models from the knee kinematics data of 35 osteoarthritis patients, operated by posterior stabilized implant, based on generalized linear regression (GLR) analysis. Two prediction methods (without and with principal component analysis followed by GLR) along with… More >

Displaying 1-10 on page 1 of 4. Per Page