A review on machine learning styles in computer vision—techniques and future directions

SV Mahadevkar, B Khemani, S Patil, K Kotecha… - Ieee …, 2022 - ieeexplore.ieee.org
Computer applications have considerably shifted from single data processing to machine
learning in recent years due to the accessibility and availability of massive volumes of data …

[HTML][HTML] Machine learning and deep learning-based approach in smart healthcare: Recent advances, applications, challenges and opportunities

A Rahman, T Debnath, D Kundu, MSI Khan… - AIMS Public …, 2024 - ncbi.nlm.nih.gov
In recent years, machine learning (ML) and deep learning (DL) have been the leading
approaches to solving various challenges, such as disease predictions, drug discovery …

CNN-LSTM: hybrid deep neural network for network intrusion detection system

A Halbouni, TS Gunawan, MH Habaebi… - IEEE …, 2022 - ieeexplore.ieee.org
Network security becomes indispensable to our daily interactions and networks. As attackers
continue to develop new types of attacks and the size of networks continues to grow, the …

[HTML][HTML] Deep learning-based intrusion detection approach for securing industrial Internet of Things

S Soliman, W Oudah, A Aljuhani - Alexandria Engineering Journal, 2023 - Elsevier
The widespread deployment of the Internet of Things (IoT) into critical sectors such as
industrial and manufacturing has resulted in the Industrial Internet of Things (IIoT). The IIoT …

[HTML][HTML] Paired patterns in logical analysis of data for decision support in recognition

IS Masich, VS Tyncheko, VA Nelyub, VV Bukhtoyarov… - Computation, 2022 - mdpi.com
Logical analysis of data (LAD), an approach to data analysis based on Boolean functions,
combinatorics, and optimization, can be considered one of the methods of interpretable …

[HTML][HTML] Towards an intelligent intrusion detection system to detect malicious activities in cloud computing

H Attou, M Mohy-eddine, A Guezzaz, S Benkirane… - Applied Sciences, 2023 - mdpi.com
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics,
such as scalability and flexibility. However, despite these advantages, security concerns …

Machine learning-based intrusion detection system: an experimental comparison

I Hidayat, MZ Ali, A Arshad - Journal of Computational and …, 2023 - ojs.bonviewpress.com
Recently, networks are moving toward automation and getting more and more intelligent.
With the advent of big data and cloud computing technologies, lots and lots of data are being …

VANET network traffic anomaly detection using GRU-based deep learning model

G ALMahadin, Y Aoudni, M Shabaz… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The rise of Vehicular Ad-hoc Networks (VANETs) has led to the growing significance in
intelligent transportation systems. This research suggests a deep learning model for …

[HTML][HTML] Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects

IH Sarker, H Janicke, A Mohsin, A Gill, L Maglaras - ICT Express, 2024 - Elsevier
Digital twins (DTs) are an emerging digitalization technology with a huge impact on today's
innovations in both industry and research. DTs can significantly enhance our society and …

[HTML][HTML] DM-DQN: Dueling Munchausen deep Q network for robot path planning

Y Gu, Z Zhu, J Lv, L Shi, Z Hou, S Xu - Complex & Intelligent Systems, 2023 - Springer
In order to achieve collision-free path planning in complex environment, Munchausen deep
Q-learning network (M-DQN) is applied to mobile robot to learn the best decision. On the …