Brain tumor detection based on multimodal information fusion and convolutional neural network

M Li, L Kuang, S Xu, Z Sha - IEEE access, 2019 - ieeexplore.ieee.org
Aiming at the problem of low accuracy of traditional brain tumor detection, in this paper, a
combination of multimodal information fusion and convolution neural network detection …

Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT)

Y An, FR Yu, J Li, J Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In recent years, with the rapid development of the Internet of Things (IoT), various
applications based on IoT have become more and more popular in industrial and living …

[图书][B] Machine learning approaches in cyber security analytics

T Thomas, AP Vijayaraghavan, S Emmanuel - 2019 - Springer
This book introduces various machine learning methods for cyber security analytics. With an
overwhelming amount of data being generated and transferred over various networks …

Android malware identification based on traffic analysis

R Chen, Y Li, W Fang - … conference on artificial intelligence and security, 2019 - Springer
As numerous new techniques for Android malware attacks have growingly emerged and
evolved, Android malware identification is extremely crucial to prevent mobile applications …

An empirical evaluation of supervised learning methods for network malware identification based on feature selection

C Manzano, C Meneses, P Leger, H Fukuda - Complexity, 2022 - Wiley Online Library
Malware is a sophisticated, malicious, and sometimes unidentifiable application on the
network. The classifying network traffic method using machine learning shows to perform …

RETRACTED: Application of Clustering Algorithm in Ideological and Political Education in Colleges and Universities

Q Wang - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
In recent years, with the rapid development of information technology, China has entered the
information age. Information technology has changed our life, but also affected the form of …

Application of clustering analysis in brain gene data based on deep learning

Y Suo, T Liu, X Jia, F Yu - IEEE Access, 2018 - ieeexplore.ieee.org
In the current research, cluster analysis has become a very good way to obtain biological
information by analyzing the brain gene expression data. In recent years, many experts have …

[HTML][HTML] DroidPortrait: android malware portrait construction based on multidimensional behavior analysis

X Su, L Xiao, W Li, X Liu, KC Li, W Liang - Applied Sciences, 2020 - mdpi.com
Recently, security incidents such as sensitive data leakage and video/audio hardware
control caused by Android malware have raised severe security issues that threaten Android …

Androidgyny: Reviewing clustering techniques for Android malware family classification

TSR Pimenta, F Ceschin, A Gregio - Digital Threats: Research and …, 2024 - dl.acm.org
Thousands of malicious applications (apps) are created daily, modified with the aid of
automation tools, and released on the World Wide Web. Several techniques have been …

Application of fuzzy C-means clustering method in the analysis of severe medical images

Y Ning, X Shi, J Yin, D Xie - Journal of Intelligent & Fuzzy …, 2020 - content.iospress.com
Medical image processing is an interdisciplinary subject of integrated medical imaging,
mathematics, computer science and other disciplines. With high spatial resolution, high …