[HTML][HTML] Interpreting black-box models: a review on explainable artificial intelligence

V Hassija, V Chamola, A Mahapatra, A Singal… - Cognitive …, 2024 - Springer
Recent years have seen a tremendous growth in Artificial Intelligence (AI)-based
methodological development in a broad range of domains. In this rapidly evolving field …

Metaverse for industry 5.0 in NextG communications: potential applications and future challenges

B Prabadevi, N Deepa, N Victor, TR Gadekallu… - arXiv preprint arXiv …, 2023 - arxiv.org
With the advent of new technologies and endeavors for automation in almost all day-to-day
activities, the recent discussions on the metaverse life have a greater expectation …

A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy

L Xia, DT Semirumi, R Rezaei - Sustainable Cities and Society, 2023 - Elsevier
With the increasing use of artificial intelligence (AI) and the Internet of Things (IoTs), it is
crucial to acknowledge the potential security and privacy issues that arise from these …

A generalizable deep neural network method for detecting attacks in industrial cyber-physical systems

J Sakhnini, H Karimipour, A Dehghantanha… - IEEE Systems …, 2023 - ieeexplore.ieee.org
Today's power systems utilize smart technology to improve the efficacy of power distribution.
Using cyber-physical components in the power system such as smart grids can introduce …

Data security, customer trust and intention for adoption of Fintech services: an empirical analysis from commercial bank users in Pakistan

W Zhang, S Siyal, S Riaz, R Ahmad, MF Hilmi… - Sage …, 2023 - journals.sagepub.com
The research aims to empirically investigate the effect of perceived easiness of use (PEU),
perceive usefulness (PU), data security (DAS) on adoption intention of Fintech services …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

Intrusion detection in Internet of things using improved binary golden jackal optimization algorithm and LSTM

AV Hanafi, A Ghaffari, H Rezaei, A Valipour… - Cluster Computing, 2024 - Springer
Internet of things (IoT) technology has gained a reputation in recent years due to its ease of
use and adaptability. Due to the amount of sensitive and significant data exchanged over the …

[HTML][HTML] Detection of Ponzi scheme on Ethereum using machine learning algorithms

IJ Onu, AE Omolara, M Alawida, OI Abiodun… - Scientific Reports, 2023 - nature.com
Security threats posed by Ponzi schemes present a considerably higher risk compared to
many other online crimes. These fraudulent online businesses, including Ponzi schemes …

Efficient reinforcement learning-based method for plagiarism detection boosted by a population-based algorithm for pretraining weights

J Xiong, J Yang, L Yan, M Awais, AA Khan… - Expert Systems with …, 2024 - Elsevier
Plagiarism detection (PD) in natural language processing involves locating similar words in
two distinct sources. The paper introduces a new approach to plagiarism detection utilizing …

[HTML][HTML] CANAttack: Assessing Vulnerabilities within Controller Area Network

D Oladimeji, A Rasheed, C Varol, M Baza… - Sensors, 2023 - mdpi.com
Current vehicles include electronic features that provide ease and convenience to drivers.
These electronic features or nodes rely on in-vehicle communication protocols to ensure …