Cybersecurity for Artificial Intelligence by Unknown

Cybersecurity for Artificial Intelligence by Unknown

Author:Unknown
Language: eng
Format: epub
ISBN: 9783030970871
Publisher: Springer International Publishing


2.4 Learning Techniques

In this section, we discuss the learning techniques that are used in our experiments. Specifically, we introduce hidden Markov models, HMM2Vec, Word2Vec, and logistic regression.

2.4.1 Hidden Markov Models

As the name suggests, a hidden Markov model (HMM) includes a Markov process that is “hidden” in the sense that it cannot be directly observed. We do have access to a series of observations that are probabilistically related to the underlying (hidden) Markov process. We can train a model to fit a given observation sequence and, given a model, we can score an observation sequence to determine how closely it fits the model. A generic HMM is illustrated in Fig. 1.

Fig. 1Hidden Markov model [35]



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.