?
О безопасности схемы биометрической аутентификации, основанной на нейронной сети
Математические вопросы криптографии. 2014. Vol. 5. No. 2. P. 87-98.
Маршалко Г. Б.
We show that neuron weights used in neural network-based biometric authentication scheme defined in GOST R 52633 standard series contain all the information on biometric data and secret key of the legitimate user. So, the complexity of evaluating (with known tables of neuron weights) the legitimate user's secret key is equivalent to the complexity of evaluating one solution of a corresponding system of linear inequalities. Thus, first, neuron weights should be considered as a part of a secret key of the authentication system, and, second, several methods for neural networks protection proposed in the standard are inefficient.
Tamm M., Valba O. V., Nechaev S., Journal of Physics A: Mathematical and Theoretical 2011 Vol. 44 P. 195001
A new statistical approach to alignment (finding the longest common subsequence) of two random RNA-type sequences is proposed. We have constructed a generalized ‘dynamic programming’ algorithm for finding the extreme value of the free energy of two noncoding RNAs. In our procedure, we take into account the binding free energy of two random heteropolymer chains ...
Added: November 19, 2013
A. A. Vnykov, Shabnom M., Advances in the Astronautical Sciences 2017 Vol. 955 P. 921-940
This article discusses the features of the spatial processes of fast and accurate positioning
of points on the external surface of the object using the manipulation robot when executing
the sequence of technical operations. Considered, pregenerating digital models of the
external surfaces of the object. The quality of obtaining the coordinates of the points of
an object's surface, determines ...
Added: March 17, 2018
Avdoshin S. M., Elena Yu. Pesotskaya, Business Informatics 2022 Vol. 16 No. 2 P. 62-73
Added: June 23, 2022
Faizov n., Shakhuro V., Sanzharov V. V. et al., Компьютерная оптика 2020 Т. 44 № 2 С. 236-245
© 2020, Institution of Russian Academy of Sciences. All rights reserved.The paper studies the possibility of using neural networks for the classification of objects that are few or absent at all in the training set. The task is illustrated by the example of classification of rare traffic signs. We consider neural networks trained using a ...
Added: November 21, 2022
Cham : Springer, 2018
The sixteen-volume set comprising the LNCS volumes 11205-11220 constitutes the refereed proceedings of the 15th European Conference on Computer Vision, ECCV 2018, held in Munich, Germany, in September 2018. The 776 revised papers presented were carefully reviewed and selected from 2439 submissions. The papers are organized in topical sections on learning for vision; computational photography; ...
Added: October 31, 2018
Springer, 2020
This book constitutes the proceedings of the 8th International Conference on Analysis of Images, Social Networks and Texts, AIST 2019, held in Kazan, Russia, in July 2019.
The 24 full papers and 10 short papers were carefully reviewed and selected from 134 submissions (of which 21 papers were rejected without being reviewed). The papers are organized ...
Added: February 9, 2020
Magaj G., Soroka A., Studies in Computational Intelligence, 2023
The basis of transfer learning methods is the ability of deep neural networks to use knowledge from one domain to learn in another domain. However, another important task is the analysis and explanation of the internal representations of deep neural networks models in the process of transfer learning. Some deep models are known to be ...
Added: October 25, 2023
Springer, 2021
This book constitutes the proceedings of the 19th Russian Conference on Artificial Intelligence, RCAI 2021, held in Moscow, Russia, in October 2021.
The 19 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 80 submissions. The conference deals with a wide range of topics, categorized into the following topical ...
Added: October 28, 2021
Bukharov O., Bogolyubov D., Федоров В. М. et al., Криосфера Земли 2016 № 3 С. 43-50
The medium-term forecasting of the sea ice extent has been carried out by determining of the relationship between incoming solar radiation and the sea ice extent in the Northern Hemisphere. Different methods of the statistic and neural modeling have been used. Forecast shows that the main factor determining the variation of the maximum and minimum ...
Added: August 18, 2016
M. : -, 2017
The issues of information support based on the use of artifical neural networks for the rapid recognition of odors using devices such as "elecronic nose" are considered. The variants the reducing the test sampl for an artifical neural network are proposed with the aim of increasing the stabilutyof computatijns and the speed of calculations. A ...
Added: October 25, 2017
Serova E., Sokolov B., Ivanov D. et al., International Journal of Risk Assessment and Management 2020 Vol. 23 No. 1 P. 106-118
The main problems and features of combined approach to the
complex objects control and management stability analysis are investigated in
the paper. Analytical-simulation scenarios and scenarios of intelligent models
and systems execution for complex objects control and management stability
analysis are given. The paper describes a particular group of models and
modelling systems – hybrid intelligent models and systems that ...
Added: April 1, 2019
Demianenko M., Samorodova E., Sysak M. et al., Journal of Physics: Conference Series 2023
Photometric data-driven classification of supernovae becomes a challenge due to the appearance of real-time processing of big data in astronomy. Recent studies have demonstrated the superior quality of solutions based on various machine learning models. These models learn to classify supernova types using their light curves as inputs. Preprocessing these curves is a crucial step ...
Added: December 9, 2022
Cham : Springer, 2019
Intelligent Systems Conference (IntelliSys) 2018 is the fourth research conference in the series. This conference is a part of SAI conferences being held since 2013. The conference series has featured keynote talks, special sessions, poster presentation, tutorials, workshops, and contributed papers each year.
The conference focus on areas of intelligent systems and artificial intelligence (AI) and ...
Added: August 29, 2018
Savchenko A., Khokhlova Y. I., Optical Memory and Neural Networks (Information Optics) 2014 Vol. 23 No. 1 P. 34-42
The paper considers the phoneme recognition by facial expressions of a speaker in voice-activated control systems. We have developed a neural network recognition algorithm by using the phonetic words decoding method and the requirement for isolated syllable pronunciation of voice commands. The paper presents the experimental results of viseme (facial and lip position corresponding to ...
Added: March 26, 2014
PMLR, 2022
Added: July 27, 2022
Arutyunov G.A., Avdoshin S. M., Proceedings of the Institute for System Programming of the RAS 2022 Vol. 34 No. 4 P. 79-88
IT industry has been thriving over the past decades. Numerous new programming languages have emerged, new architectural patterns and software development techniques. Tools involved in the process ought to evolve as well. One of the key principles of new generation of instruments for software development would be the ability of the tools to learn using ...
Added: December 26, 2022
Arkhipova M., Экономика региона 2022 Т. 18 № 2 С. 581-594
The article examines new methodologies for modelling crop yield in agricultural regions of Russia based on the use of remote capabilities to get information on the field state. The proposed approach can be applied to develop indicator systems and create methodological platforms and models necessary to obtain more accurate estimates. In comparison with the traditional ...
Added: January 12, 2023
Cham : Springer, 2023
This book constitutes the refereed proceedings of the 12th European Conference on Artificial Intelligence in Music, Sound, Art and Design, EvoMUSART 2023, held as part of Evo* 2023, in April 2023, co-located with the Evo* 2023 events, EvoCOP, EvoApplications, and EuroGP.
The 20 full papers and 7 short papers presented in this book were carefully reviewed ...
Added: April 4, 2023
Akopov A. S., Аудит и финансовый анализ 2010 № 3 С. 310-317
In work the developed model of adaptive management by the vertically integrated companies based on the system approach supporting the mechanism of an operational management in a uniform cycle of strategic planning, within the limits of faster time is presented. Thus for a finding of optimum values of operating parameters special algorithms of a class ...
Added: September 28, 2012
Chemodanov D., Esposito F., Calyam P. et al., IEEE Transactions on Network and Service Management 2019 Vol. 16 No. 1 P. 127-142
Virtual network services that span multiple data centers are important to support emerging data-intensive applications in fields such as bioinformatics and retail analytics. Successful virtual network service composition and maintenance requires flexible and scalable “constrained shortest path management” both in the management plane for virtual network embedding (VNE) or network function virtualization service chaining (NFV-SC), ...
Added: December 3, 2019
Springer, 2021
This 8-volumes set constitutes the refereed of the 25th International Conference on Pattern Recognition Workshops, ICPR 2020, held virtually in Milan, Italy and rescheduled to January 10 - 11, 2021 due to Covid-19 pandemic. The 416 full papers presented in these 8 volumes were carefully reviewed and selected from about 700 submissions. The 46 workshops cover ...
Added: April 10, 2022
Cham : Springer, 2019
This book constitutes the post-conference proceedings of the 4th International Conference on Machine Learning, Optimization, and Data Science, LOD 2018, held in Volterra, Italy, in September 2018.The 46 full papers presented were carefully reviewed and selected from 126 submissions. The papers cover topics in the field of machine learning, artificial intelligence, reinforcement learning, computational optimization and data ...
Added: October 17, 2019
Perov A., Пестунов А. И., Прикладная дискретная математика 2020 № 3 С. 46-56
The paper explores possibility of applying convolutional neural networks to the security analysis of iterative block ciphers. A new approach for constructing distinguishing
attacks based on a convolutional neural network is proposed. The approach is based
on distinguishing between graphic equivalents of ciphertexts received by the CTR
(counter) encryption mode after different number of rounds, including the number
of ...
Added: November 1, 2021
Семенов В. В., Lebedev I., Сухопаров М. Е., Прикладная информатика 2018 № 5(77) С. 72-83
The task of determining information security state of objects using the information of signals of electromagnetic emissions of individual elements of devices of cyber-physical systems was investigated. We consider the main side channels of information with which it is possible to monitor the state of the system and analyze the software and hardware environment. ...
Added: April 23, 2019