Picture for Hanan Hindy

Hanan Hindy

TapToTab : Video-Based Guitar Tabs Generation using AI and Audio Analysis

Add code
Sep 13, 2024
Figure 1 for TapToTab : Video-Based Guitar Tabs Generation using AI and Audio Analysis
Figure 2 for TapToTab : Video-Based Guitar Tabs Generation using AI and Audio Analysis
Figure 3 for TapToTab : Video-Based Guitar Tabs Generation using AI and Audio Analysis
Figure 4 for TapToTab : Video-Based Guitar Tabs Generation using AI and Audio Analysis
Viaarxiv icon

An Evaluation of Lightweight Deep Learning Techniques in Medical Imaging for High Precision COVID-19 Diagnostics

Add code
May 30, 2023
Viaarxiv icon

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Add code
Mar 06, 2021
Figure 1 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 2 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 3 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 4 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Viaarxiv icon

Leveraging Siamese Networks for One-Shot Intrusion Detection Model

Add code
Jun 27, 2020
Figure 1 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 2 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 3 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 4 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Viaarxiv icon

Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning

Add code
Mar 06, 2019
Figure 1 for Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
Figure 2 for Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
Figure 3 for Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
Figure 4 for Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
Viaarxiv icon

A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets

Add code
Jun 09, 2018
Figure 1 for A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
Figure 2 for A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
Figure 3 for A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
Figure 4 for A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
Viaarxiv icon