Picture for Faranak Abri

Faranak Abri

The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data

Add code
Nov 27, 2024
Figure 1 for The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data
Figure 2 for The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data
Figure 3 for The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data
Figure 4 for The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data
Viaarxiv icon

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

Add code
Apr 15, 2024
Viaarxiv icon

A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models

Add code
Dec 17, 2021
Figure 1 for A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models
Figure 2 for A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models
Figure 3 for A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models
Figure 4 for A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models
Viaarxiv icon

Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks

Add code
Jun 03, 2021
Figure 1 for Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
Figure 2 for Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
Figure 3 for Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
Figure 4 for Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
Viaarxiv icon

Phishing Detection through Email Embeddings

Add code
Dec 28, 2020
Figure 1 for Phishing Detection through Email Embeddings
Figure 2 for Phishing Detection through Email Embeddings
Figure 3 for Phishing Detection through Email Embeddings
Figure 4 for Phishing Detection through Email Embeddings
Viaarxiv icon

Predicting Emotions Perceived from Sounds

Add code
Dec 04, 2020
Figure 1 for Predicting Emotions Perceived from Sounds
Figure 2 for Predicting Emotions Perceived from Sounds
Figure 3 for Predicting Emotions Perceived from Sounds
Figure 4 for Predicting Emotions Perceived from Sounds
Viaarxiv icon

Fake Reviews Detection through Analysis of Linguistic Features

Add code
Oct 08, 2020
Figure 1 for Fake Reviews Detection through Analysis of Linguistic Features
Figure 2 for Fake Reviews Detection through Analysis of Linguistic Features
Figure 3 for Fake Reviews Detection through Analysis of Linguistic Features
Figure 4 for Fake Reviews Detection through Analysis of Linguistic Features
Viaarxiv icon

Fake Reviews Detection through Ensemble Learning

Add code
Jun 14, 2020
Figure 1 for Fake Reviews Detection through Ensemble Learning
Figure 2 for Fake Reviews Detection through Ensemble Learning
Figure 3 for Fake Reviews Detection through Ensemble Learning
Figure 4 for Fake Reviews Detection through Ensemble Learning
Viaarxiv icon

The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities

Add code
Nov 21, 2019
Figure 1 for The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities
Figure 2 for The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities
Figure 3 for The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities
Figure 4 for The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities
Viaarxiv icon