Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023 - Elsevier
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …

Trends and directions of financial technology (Fintech) in society and environment: A bibliometric study

A Nasir, K Shaukat, K Iqbal Khan, I A. Hameed… - Applied Sciences, 2021 - mdpi.com
The contemporary innovations in financial technology (fintech) serve society with an
environmentally friendly atmosphere. Fintech covers an enormous range of activities from …

A novel deep learning-based approach for malware detection

K Shaukat, S Luo, V Varadharajan - Engineering Applications of Artificial …, 2023 - Elsevier
Malware detection approaches can be classified into two classes, including static analysis
and dynamic analysis. Conventional approaches of the two classes have their respective …

A comparative performance analysis of data resampling methods on imbalance medical data

M Khushi, K Shaukat, TM Alam, IA Hameed… - IEEE …, 2021 - ieeexplore.ieee.org
Medical datasets are usually imbalanced, where negative cases severely outnumber
positive cases. Therefore, it is essential to deal with this data skew problem when training …

A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks

K Shaukat, S Luo, V Varadharajan - Engineering Applications of Artificial …, 2022 - Elsevier
Malware is constantly evolving with rising concern for cyberspace. Deep learning-based
malware detectors are being used as a potential solution. However, these detectors are …

Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems

H Alqahtani, G Kumar - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This paper delves into the transformative role of machine learning (ML) techniques in
revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains …

Realguard: A lightweight network intrusion detection system for IoT gateways

XH Nguyen, XD Nguyen, HH Huynh, KH Le - Sensors, 2022 - mdpi.com
Cyber security has become increasingly challenging due to the proliferation of the Internet of
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …

IMIDS: An intelligent intrusion detection system against cyber threats in IoT

KH Le, MH Nguyen, TD Tran, ND Tran - Electronics, 2022 - mdpi.com
The increasing popularity of the Internet of Things (IoT) has significantly impacted our daily
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …

Application of machine learning techniques in injection molding quality prediction: Implications on sustainable manufacturing industry

H Jung, J Jeon, D Choi, JY Park - Sustainability, 2021 - mdpi.com
With sustainable growth highlighted as a key to success in Industry 4.0, manufacturing
companies attempt to optimize production efficiency. In this study, we investigated whether …

Human–computer interaction with a real-time speech emotion recognition with ensembling techniques 1D convolution neural network and attention

W Alsabhan - Sensors, 2023 - mdpi.com
Emotions have a crucial function in the mental existence of humans. They are vital for
identifying a person's behaviour and mental condition. Speech Emotion Recognition (SER) …