A survey on deep learning for cybersecurity: Progress, challenges, and opportunities

M Macas, C Wu, W Fuertes - Computer Networks, 2022 - Elsevier
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …

Host-based IDS: A review and open issues of an anomaly detection system in IoT

I Martins, JS Resende, PR Sousa, S Silva… - Future Generation …, 2022 - Elsevier
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …

Multilevel threshold image segmentation for COVID-19 chest radiography: A framework using horizontal and vertical multiverse optimization

H Su, D Zhao, H Elmannai, AA Heidari… - Computers in Biology …, 2022 - Elsevier
COVID-19 is currently raging worldwide, with more patients being diagnosed every day. It
usually is diagnosed by examining pathological photographs of the patient's lungs. There is …

How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective

Z Wu, S Xuan, J Xie, C Lin, C Lu - Computers in biology and medicine, 2022 - Elsevier
From a technical perspective, for electronic medical records (EMR), this paper proposes an
effective confidential management solution on the cloud, whose basic idea is to deploy a …

Simulated annealing-based dynamic step shuffled frog leaping algorithm: Optimal performance design and feature selection

Y Liu, AA Heidari, Z Cai, G Liang, H Chen, Z Pan… - Neurocomputing, 2022 - Elsevier
The shuffled frog leaping algorithm is a new optimization algorithm proposed to solve the
combinatorial optimization problem, which effectively combines the memetic algorithm …

Apple leaf disease recognition method with improved residual network

H Yu, X Cheng, C Chen, AA Heidari, J Liu, Z Cai… - Multimedia Tools and …, 2022 - Springer
The occurrence of apple diseases has dramatically affected the quality and yield of apples.
Disease monitoring is an important measure to ensure the healthy development of the apple …

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

HSNet: A hybrid semantic network for polyp segmentation

W Zhang, C Fu, Y Zheng, F Zhang, Y Zhao… - Computers in biology and …, 2022 - Elsevier
Automatic polyp segmentation can help physicians to effectively locate polyps (aka region of
interests) in clinical practice, in the way of screening colonoscopy images assisted by neural …

[HTML][HTML] Hierarchical Harris hawks optimizer for feature selection

L Peng, Z Cai, AA Heidari, L Zhang, H Chen - Journal of Advanced …, 2023 - Elsevier
Introduction The main feature selection methods include filter, wrapper-based, and
embedded methods. Because of its characteristics, the wrapper method must include a …

An adaptive quadratic interpolation and rounding mechanism sine cosine algorithm with application to constrained engineering optimization problems

X Yang, R Wang, D Zhao, F Yu, C Huang… - Expert Systems with …, 2023 - Elsevier
The sine cosine algorithm (SCA) is a well-known meta-heuristic optimization algorithm. SCA
has received much attention in various optimization fields due to its simple structure and …