Modelling of Reptile Search Algorithm with Deep Learning Approach for Copy Move Image Forgery Detection

M Maashi, H Alamro, H Mohsen, N Negm… - IEEE …, 2023 - ieeexplore.ieee.org
Copy-move (CM) forgery is a common type of image manipulation that involves copying and
pasting a region within an image to conceal or duplicate content. Detection of such forgeries …

[PDF][PDF] Cyberbullying detection on twitter using natural language processing and machine learning techniques

S Afrifa, V Varadarajan - International Journal of Innovative Technology …, 2022 - core.ac.uk
People use social media to engage and debate themes ranging from entertainment to sports
to politics and many others. The use of social media has also resulted in an increase in …

[PDF][PDF] Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection.

FS Alrayes, N Alotaibi, JS Alzahrani… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
The Internet of Things (IoT) is a type of network which enables objects connected by utilizing
communication protocols. Connected objects are in all forms (ie, smart fridges, watches, and …

[HTML][HTML] Evolutionary-based deep stacked autoencoder for intrusion detection in a cloud-based cyber-physical system

MA Duhayyim, KA Alissa, FS Alrayes, SS Alotaibi… - Applied Sciences, 2022 - mdpi.com
As cyberattacks develop in volume and complexity, machine learning (ML) was extremely
implemented for managing several cybersecurity attacks and malicious performance. The …

[PDF][PDF] Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment.

KM Alalayah, FS Alrayes, JS Alzahrani… - Comput. Syst. Sci …, 2023 - academia.edu
With the increased advancements of smart industries, cybersecurity has become a vital
growth factor in the success of industrial transformation. The Industrial Internet of Things …

Optimal deep learning driven intrusion detection in SDN-Enabled IoT environment

M Maray, H Mesfer Alshahrani… - … Materials & Continua, 2022 - wrap.warwick.ac.uk
In recent years, wireless networks are widely used in different domains. This phenomenon
has increased the number of Internet of Things (IoT) devices and their applications. Though …

[PDF][PDF] Automated autism spectral disorder classification using optimal machine learning model

HA Mengash, H Alqahtani, M Maray… - CMC Comput. Mater …, 2023 - cdn.techscience.cn
Autism Spectrum Disorder (ASD) refers to a neuro-disorder where an individual has long-
lasting effects on communication and interaction with others. Advanced information …

[HTML][HTML] Hosted Cuckoo Optimization Algorithm with Stacked Autoencoder-Enabled Sarcasm Detection in Online Social Networks

DH Elkamchouchi, JS Alzahrani, MM Asiri… - Applied Sciences, 2022 - mdpi.com
Sarcasm detection has received considerable interest in online social media networks due
to the dramatic expansion in Internet usage. Sarcasm is a linguistic expression of dislikes or …

[PDF][PDF] Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment.

ZF Khan, SM Alshahrani, AA Alghamdi… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
The Internet of Things (IoT) is determine enormous economic openings for industries and
allow stimulating innovation which obtain between domains in childcare for eldercare, in …

[PDF][PDF] Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model.

MM Asiri, HG Mohamed, MK Nour… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
Due to exponential increase in smart resource limited devices and high speed
communication technologies, Internet of Things (IoT) have received significant attention in …