ResNeXt+: Attention mechanisms based on ResNeXt for malware detection and classification

Y He, X Kang, Q Yan, E Li - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Malware detection and classification are crucial for protecting digital devices and information
systems. Accurate identification of malware enables researchers and incident responders to …

A novel android botnet detection system using image-based and manifest file features

SY Yerima, A Bashar - Electronics, 2022 - mdpi.com
Malicious botnet applications have become a serious threat and are increasingly
incorporating sophisticated detection avoidance techniques. Hence, there is a need for more …

Short range correlation transformer for occluded person re-identification

Y Zhao, S Zhu, D Wang, Z Liang - Neural computing and applications, 2022 - Springer
Occluded person re-identification is one of the challenging areas of computer vision, which
faces problems such as inefficient feature representation and low recognition accuracy …

Analyzing and explaining black-box models for online malware detection

H Manthena, JC Kimmel, M Abdelsalam… - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, a significant amount of research has focused on analyzing the effectiveness
of machine learning (ML) models for malware detection. These approaches have ranged …

E2E-RDS: Efficient End-to-End ransomware detection system based on Static-Based ML and Vision-Based DL approaches

I Almomani, A Alkhayer, W El-Shafai - Sensors, 2023 - mdpi.com
Nowadays, ransomware is considered one of the most critical cyber-malware categories. In
recent years various malware detection and classification approaches have been proposed …

Pose estimation of driver's head panning based on interpolation and motion vectors under a boosting framework

SF Ali, AS Aslam, MJ Awan, A Yasin, R Damaševičius - Applied Sciences, 2021 - mdpi.com
Over the last decade, a driver's distraction has gained popularity due to its increased
significance and high impact on road accidents. Various factors, such as mood disorder …

SAGMAD—A signature agnostic malware detection system based on binary visualisation and fuzzy sets

B Saridou, JR Rose, S Shiaeles, B Papadopoulos - Electronics, 2022 - mdpi.com
Image conversion of byte-level data, or binary visualisation, is a relevant approach to
security applications interested in malicious activity detection. However, in practice, binary …

SDFPoseGraphNet: spatial deep feature pose graph network for 2d hand pose estimation

SA Salman, A Zakir, H Takahashi - Sensors, 2023 - mdpi.com
In the field of computer vision, hand pose estimation (HPE) has attracted significant attention
from researchers, especially in the fields of human–computer interaction (HCI) and virtual …

Framing network flow for anomaly detection using image recognition and federated learning

J Toldinas, A Venčkauskas, A Liutkevičius… - Electronics, 2022 - mdpi.com
The intrusion detection system (IDS) must be able to handle the increase in attack volume,
increasing Internet traffic, and accelerating detection speeds. Network flow feature (NTF) …

Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems

AM Hilal, S Al-Otaibi, H Mahgoub, FN Al-Wesabi… - Cluster …, 2023 - Springer
A cyber physical system (CPS) is a network of cyber (computation, communication) and
physical (sensors, actuators) components which interact with one another in a feedback form …