[Retracted] A Deep Spiking Neural Network Anomaly Detection Method

L Hu, Y Liu, W Qiu - Computational Intelligence and …, 2022 - Wiley Online Library
Cyber‐attacks on specialized industrial control systems are increasing in frequency and
sophistication, which means stronger countermeasures need to be implemented, requiring …

Improved pattern recognition techniques for monitoring human activity recognition in digital platforms through image processing techniques

V Sumathi, D Vanathi, JC Musale… - 2023 Second …, 2023 - ieeexplore.ieee.org
With the rapid advancement of digital platforms and the increasing prevalence of visual data,
the need for accurate and efficient human activity recognition has become paramount. In this …

Detection and Control of Cyberbullying via Machine Learning

KS Rai, K Singh - 2023 14th International Conference on …, 2023 - ieeexplore.ieee.org
Cyberbullying is disturbing harassment that has grave repercussions. It can be found in
several forms and most social networks only display it as text. The online behavior of …

Advanced Privacy-Preserving Framework for Enhancing Fog Computing to Secure IoT Data Stream

AK Ranjan, P Kumar - Journal of Electrical Systems, 2024 - search.proquest.com
The proposed privacy-preserving framework based on fog computing for securing loT data
was examined through 10 experiment trials, with each trial dissecting a number of …