Ransomware detection using the dynamic analysis and machine learning: A survey and research directions

U Urooj, BAS Al-rimy, A Zainal, FA Ghaleb… - Applied Sciences, 2021 - mdpi.com
Ransomware is an ill-famed malware that has received recognition because of its lethal and
irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …

A comprehensive review on deep learning algorithms: Security and privacy issues

M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem… - Computers & …, 2023 - Elsevier
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …

Generalized out-of-distribution detection: A survey

J Yang, K Zhou, Y Li, Z Liu - International Journal of Computer Vision, 2024 - Springer
Abstract Out-of-distribution (OOD) detection is critical to ensuring the reliability and safety of
machine learning systems. For instance, in autonomous driving, we would like the driving …

An efficient approach based on privacy-preserving deep learning for satellite image classification

M Alkhelaiwi, W Boulila, J Ahmad, A Koubaa, M Driss - Remote Sensing, 2021 - mdpi.com
Satellite images have drawn increasing interest from a wide variety of users, including
business and government, ever since their increased usage in important fields ranging from …

An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications

MA Al-Khasawneh, I Uddin, SAA Shah… - Cluster …, 2022 - Springer
Image encryption algorithms based on Chaotic approach are becoming increasingly popular
for remotely sensed images using parallel techniques. It has been demonstrated that the …

iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System

J Verma, A Bhandari, G Singh - Computer Communications, 2022 - Elsevier
Introduction: The growth of ubiquitous networked devices and the proliferation of
geographically dispersed 'Internet of Thing'devices have exponentially increased network …

Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions

E Antwi-Boasiako, S Zhou, Y Liao, Q Liu… - Journal of Information …, 2021 - Elsevier
Abstract Distributed or Collaborative Deep Learning, has recently gained more recognition
due to its major advantage of allowing two or more learning participants to contribute and …

A benchmark API call dataset for windows PE malware classification

FO Catak, AF Yazı - arXiv preprint arXiv:1905.01999, 2019 - arxiv.org
The use of operating system API calls is a promising task in the detection of PE-type
malware in the Windows operating system. This task is officially defined as running malware …

[HTML][HTML] A comprehensive survey of robust deep learning in computer vision

J Liu, Y Jin - Journal of Automation and Intelligence, 2023 - Elsevier
Deep learning has presented remarkable progress in various tasks. Despite the excellent
performance, deep learning models remain not robust, especially to well-designed …

Data transformation schemes for cnn-based network traffic analysis: A survey

J Krupski, W Graniszewski, M Iwanowski - Electronics, 2021 - mdpi.com
The enormous growth of services and data transmitted over the internet, the bloodstream of
modern civilization, has caused a remarkable increase in cyber attack threats. This fact has …