A survey on federated learning: challenges and applications

J Wen, Z Zhang, Y Lan, Z Cui, J Cai… - International Journal of …, 2023 - Springer
Federated learning (FL) is a secure distributed machine learning paradigm that addresses
the issue of data silos in building a joint model. Its unique distributed training mode and the …

ConvUNeXt: An efficient convolution neural network for medical image segmentation

Z Han, M Jian, GG Wang - Knowledge-based systems, 2022 - Elsevier
Recently, ConvNeXts constructing from standard ConvNet modules has produced
competitive performance in various image applications. In this paper, an efficient model …

A novel deep learning-based approach for malware detection

K Shaukat, S Luo, V Varadharajan - Engineering Applications of Artificial …, 2023 - Elsevier
Malware detection approaches can be classified into two classes, including static analysis
and dynamic analysis. Conventional approaches of the two classes have their respective …

IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture

D Vasan, M Alazab, S Wassan, H Naeem, B Safaei… - Computer Networks, 2020 - Elsevier
The volume, type, and sophistication of malware is increasing. Deep convolutional neural
networks (CNNs) have lately proven their effectiveness in malware binary detection through …

Image-Based malware classification using ensemble of CNN architectures (IMCEC)

D Vasan, M Alazab, S Wassan, B Safaei, Q Zheng - Computers & Security, 2020 - Elsevier
Both researchers and malware authors have demonstrated that malware scanners are
unfortunately limited and are easily evaded by simple obfuscation techniques. This paper …

Deep learning methods for malware and intrusion detection: A systematic literature review

R Ali, A Ali, F Iqbal, M Hussain… - Security and …, 2022 - Wiley Online Library
Android and Windows are the predominant operating systems used in mobile environment
and personal computers and it is expected that their use will rise during the next decade …

An under‐sampled software defect prediction method based on hybrid multi‐objective cuckoo search

X Cai, Y Niu, S Geng, J Zhang, Z Cui… - Concurrency and …, 2020 - Wiley Online Library
Both the problem of class imbalance in datasets and parameter selection of Support Vector
Machine (SVM) are crucial to predict software defects. However, there is no one working to …

A sharding scheme-based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial internet of things

X Cai, S Geng, J Zhang, D Wu, Z Cui… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
While the industrial Internet of Things (IIoT) can support efficient control of the physical world
through large amounts of industrial data, data security has been a challenge due to various …

Image-based malware classification using VGG19 network and spatial convolutional attention

MJ Awan, OA Masood, MA Mohammed, A Yasin… - Electronics, 2021 - mdpi.com
In recent years the amount of malware spreading through the internet and infecting
computers and other communication devices has tremendously increased. To date …

Malicious code detection under 5G HetNets based on a multi-objective RBM model

Z Cui, Y Zhao, Y Cao, X Cai, W Zhang, J Chen - IEEE Network, 2021 - ieeexplore.ieee.org
The fifth generation (5G) mobile communication technology brings people a higher
perceived rate experience, the high-quality service of high-density user connection, and …