Attackers are constantly looking for ways to exploit the latest vulnerabilities and/or new ways to exploit old vulnerabilities. Cyber-attacks are often leveraged by threat actors as part of a coordinated campaign against a spec...
This project deals with classifying the emotions experienced by a person based on their speech and the intonations in their speech. It was Influenced by the need for emotion recognition for human-robot interaction. Often facia...