Search
Now showing items 1-7 of 7
DYNAMIC DEFENSES AND THE TRANSFERABILITY OF ADVERSARIAL EXAMPLES
(East Carolina University, 2019-05-02)
Adversarial machine learning has been an important area of study for the securing of machine learning systems. However, for every defense that is made to protect these artificial learners, a more sophisticated attack emerges ...
Personality assessment from social media data: An ensemble model
(East Carolina University, 2019-05-01)
The global prevalence of social media encourages people to upload and share a vast and recurrent amount of information about themselves through various mediums of communication such as text, pictures, audio, and video. ...
Modeling and Prediction of Cryptocurrency Prices Using Machine Learning Techniques
(East Carolina University, 2019-05-01)
With the introduction of Bitcoin in the year 2008 as the first practical decentralized cryptocurrency, the interest in cryptocurrencies and their underlying technology, Blockchain, has skyrocketed. Their promise of security, ...
MACHINE LEARNING BASED MEDICAL INFORMATION RETRIEVAL SYSTEMS
(East Carolina University, 2019-04-23)
As many fields progress with the assistance of cognitive computing, the field of health care is also adapting, providing many benefits to all users. However, advancements in this area are hindered by several challenges ...
CUSTOMER REVIEWS ANALYSIS WITH DEEP NEURAL NETWORKS FOR E-COMMERCE RECOMMENDER SYSTEMS
(East Carolina University, 2019-07-17)
The first part of this thesis systematically reviews the trend of researches conducted from 2011 to 2018 in terms of challenges and problems regarding developing a recommendation system, areas of application, proposed ...
CUSTOMER REVENUE PREDICTION FROM GEOGRAPHICAL DATA
(East Carolina University, 2019-07-22)
Online stores have created more opportunities for firms to offer different products and services to their customers. These online stores produce a tremendous amount of data that serve different purposes, including revenue ...
Intrusion detection using machine learning algorithms
(East Carolina University, 2019-11-27)
With the growing rate of cyber-attacks, there is a significant need for intrusion detection systems (IDS) in networked environments. As intrusion tactics become more sophisticated and more challenging to detect, this ...