Alert button
Picture for Enrique Alegre

Enrique Alegre

Alert button

MeWEHV: Mel and Wave Embeddings for Human Voice Tasks

Add code
Bookmark button
Alert button
Sep 28, 2022
Andrés Vasco-Carofilis, Laura Fernández-Robles, Enrique Alegre, Eduardo Fidalgo

Figure 1 for MeWEHV: Mel and Wave Embeddings for Human Voice Tasks
Figure 2 for MeWEHV: Mel and Wave Embeddings for Human Voice Tasks
Figure 3 for MeWEHV: Mel and Wave Embeddings for Human Voice Tasks
Figure 4 for MeWEHV: Mel and Wave Embeddings for Human Voice Tasks
Viaarxiv icon

Efficient Detection of Botnet Traffic by features selection and Decision Trees

Add code
Bookmark button
Alert button
Jun 30, 2021
Javier Velasco-Mata, Víctor González-Castro, Eduardo Fidalgo, Enrique Alegre

Figure 1 for Efficient Detection of Botnet Traffic by features selection and Decision Trees
Figure 2 for Efficient Detection of Botnet Traffic by features selection and Decision Trees
Figure 3 for Efficient Detection of Botnet Traffic by features selection and Decision Trees
Figure 4 for Efficient Detection of Botnet Traffic by features selection and Decision Trees
Viaarxiv icon

Video Camera Identification from Sensor Pattern Noise with a Constrained ConvNet

Add code
Bookmark button
Alert button
Dec 11, 2020
Derrick Timmerman, Swaroop Bennabhaktula, Enrique Alegre, George Azzopardi

Figure 1 for Video Camera Identification from Sensor Pattern Noise with a Constrained ConvNet
Figure 2 for Video Camera Identification from Sensor Pattern Noise with a Constrained ConvNet
Figure 3 for Video Camera Identification from Sensor Pattern Noise with a Constrained ConvNet
Figure 4 for Video Camera Identification from Sensor Pattern Noise with a Constrained ConvNet
Viaarxiv icon

Short Text Classification Approach to Identify Child Sexual Exploitation Material

Add code
Bookmark button
Alert button
Nov 13, 2020
Mhd Wesam Al-Nabki, Eduardo Fidalgo, Enrique Alegre, Rocío Alaiz-Rodríguez

Figure 1 for Short Text Classification Approach to Identify Child Sexual Exploitation Material
Figure 2 for Short Text Classification Approach to Identify Child Sexual Exploitation Material
Figure 3 for Short Text Classification Approach to Identify Child Sexual Exploitation Material
Figure 4 for Short Text Classification Approach to Identify Child Sexual Exploitation Material
Viaarxiv icon

Classification of Industrial Control Systems screenshots using Transfer Learning

Add code
Bookmark button
Alert button
May 21, 2020
Pablo Blanco Medina, Eduardo Fidalgo Fernandez, Enrique Alegre, Francisco Jáñez Martino, Roberto A. Vasco-Carofilis, Víctor Fidalgo Villar

Figure 1 for Classification of Industrial Control Systems screenshots using Transfer Learning
Figure 2 for Classification of Industrial Control Systems screenshots using Transfer Learning
Figure 3 for Classification of Industrial Control Systems screenshots using Transfer Learning
Viaarxiv icon

Device-based Image Matching with Similarity Learning by Convolutional Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise

Add code
Bookmark button
Alert button
Apr 23, 2020
Guru Swaroop Bennabhaktula, Enrique Alegre, Dimka Karastoyanova, George Azzopardi

Figure 1 for Device-based Image Matching with Similarity Learning by Convolutional Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise
Figure 2 for Device-based Image Matching with Similarity Learning by Convolutional Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise
Figure 3 for Device-based Image Matching with Similarity Learning by Convolutional Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise
Figure 4 for Device-based Image Matching with Similarity Learning by Convolutional Neural Networks that Exploit the Underlying Camera Sensor Pattern Noise
Viaarxiv icon

Content-Based Features to Rank Influential Hidden Services of the Tor Darknet

Add code
Bookmark button
Alert button
Oct 05, 2019
Mhd Wesam Al-Nabki, Eduardo Fidalgo, Enrique Alegre, Deisy Chaves

Figure 1 for Content-Based Features to Rank Influential Hidden Services of the Tor Darknet
Figure 2 for Content-Based Features to Rank Influential Hidden Services of the Tor Darknet
Figure 3 for Content-Based Features to Rank Influential Hidden Services of the Tor Darknet
Figure 4 for Content-Based Features to Rank Influential Hidden Services of the Tor Darknet
Viaarxiv icon