Picture for Akbar Siami Namin

Akbar Siami Namin

The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data

Add code
Nov 27, 2024
Figure 1 for The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data
Figure 2 for The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data
Figure 3 for The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data
Figure 4 for The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data
Viaarxiv icon

A Survey on Blockchain-Based Federated Learning and Data Privacy

Add code
Jun 29, 2023
Viaarxiv icon

A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models

Add code
Dec 17, 2021
Figure 1 for A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models
Figure 2 for A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models
Figure 3 for A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models
Figure 4 for A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models
Viaarxiv icon

Attack Prediction using Hidden Markov Model

Add code
Jun 03, 2021
Figure 1 for Attack Prediction using Hidden Markov Model
Figure 2 for Attack Prediction using Hidden Markov Model
Figure 3 for Attack Prediction using Hidden Markov Model
Figure 4 for Attack Prediction using Hidden Markov Model
Viaarxiv icon

Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks

Add code
Jun 03, 2021
Figure 1 for Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
Figure 2 for Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
Figure 3 for Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
Figure 4 for Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
Viaarxiv icon

Phishing Detection through Email Embeddings

Add code
Dec 28, 2020
Figure 1 for Phishing Detection through Email Embeddings
Figure 2 for Phishing Detection through Email Embeddings
Figure 3 for Phishing Detection through Email Embeddings
Figure 4 for Phishing Detection through Email Embeddings
Viaarxiv icon

Predicting Emotions Perceived from Sounds

Add code
Dec 04, 2020
Figure 1 for Predicting Emotions Perceived from Sounds
Figure 2 for Predicting Emotions Perceived from Sounds
Figure 3 for Predicting Emotions Perceived from Sounds
Figure 4 for Predicting Emotions Perceived from Sounds
Viaarxiv icon

Fake Reviews Detection through Analysis of Linguistic Features

Add code
Oct 08, 2020
Figure 1 for Fake Reviews Detection through Analysis of Linguistic Features
Figure 2 for Fake Reviews Detection through Analysis of Linguistic Features
Figure 3 for Fake Reviews Detection through Analysis of Linguistic Features
Figure 4 for Fake Reviews Detection through Analysis of Linguistic Features
Viaarxiv icon

Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition

Add code
Oct 08, 2020
Figure 1 for Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition
Figure 2 for Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition
Figure 3 for Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition
Figure 4 for Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition
Viaarxiv icon

Detection of Coincidentally Correct Test Cases through Random Forests

Add code
Jun 14, 2020
Figure 1 for Detection of Coincidentally Correct Test Cases through Random Forests
Figure 2 for Detection of Coincidentally Correct Test Cases through Random Forests
Figure 3 for Detection of Coincidentally Correct Test Cases through Random Forests
Figure 4 for Detection of Coincidentally Correct Test Cases through Random Forests
Viaarxiv icon