Picture for Robert Atkinson

Robert Atkinson

Non-invasive Diver Respiration Rate Monitoring in Hyperbaric Lifeboat Environments using Short-Range Radar

Add code
Apr 15, 2024
Viaarxiv icon

Detecting Cloud Presence in Satellite Images Using the RGB-based CLIP Vision-Language Model

Add code
Aug 01, 2023
Viaarxiv icon

Neural Weight Step Video Compression

Add code
Dec 02, 2021
Figure 1 for Neural Weight Step Video Compression
Figure 2 for Neural Weight Step Video Compression
Viaarxiv icon

Neural Knitworks: Patched Neural Implicit Representation Networks

Add code
Sep 29, 2021
Figure 1 for Neural Knitworks: Patched Neural Implicit Representation Networks
Figure 2 for Neural Knitworks: Patched Neural Implicit Representation Networks
Figure 3 for Neural Knitworks: Patched Neural Implicit Representation Networks
Figure 4 for Neural Knitworks: Patched Neural Implicit Representation Networks
Viaarxiv icon

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Add code
Mar 06, 2021
Figure 1 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 2 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 3 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Figure 4 for Utilising Flow Aggregation to Classify Benign Imitating Attacks
Viaarxiv icon

Leveraging Siamese Networks for One-Shot Intrusion Detection Model

Add code
Jun 27, 2020
Figure 1 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 2 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 3 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Figure 4 for Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Viaarxiv icon

A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets

Add code
Jun 09, 2018
Figure 1 for A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
Figure 2 for A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
Figure 3 for A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
Figure 4 for A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
Viaarxiv icon

Machine Learning Approach for Detection of nonTor Traffic

Add code
Aug 29, 2017
Figure 1 for Machine Learning Approach for Detection of nonTor Traffic
Figure 2 for Machine Learning Approach for Detection of nonTor Traffic
Figure 3 for Machine Learning Approach for Detection of nonTor Traffic
Figure 4 for Machine Learning Approach for Detection of nonTor Traffic
Viaarxiv icon

Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System

Add code
Apr 07, 2017
Figure 1 for Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System
Figure 2 for Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System
Figure 3 for Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System
Figure 4 for Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System
Viaarxiv icon

Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey

Add code
Jan 09, 2017
Figure 1 for Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey
Figure 2 for Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey
Figure 3 for Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey
Figure 4 for Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey
Viaarxiv icon