Explainable artificial intelligence applications in cyber security: State-of-the-art in research

Z Zhang, H Al Hamadi, E Damiani, CY Yeun… - IEEE …, 2022 - ieeexplore.ieee.org
This survey presents a comprehensive review of current literature on Explainable Artificial
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …

A review on social spam detection: Challenges, open issues, and future directions

S Rao, AK Verma, T Bhatia - Expert Systems with Applications, 2021 - Elsevier
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …

Efficient prediction of cardiovascular disease using machine learning algorithms with relief and LASSO feature selection techniques

P Ghosh, S Azam, M Jonkman, A Karim… - IEEE …, 2021 - ieeexplore.ieee.org
Cardiovascular diseases (CVD) are among the most common serious illnesses affecting
human health. CVDs may be prevented or mitigated by early diagnosis, and this may reduce …

Spam detection using bidirectional transformers and machine learning classifier algorithms

Y Guo, Z Mustafaoglu… - journal of Computational …, 2023 - ojs.bonviewpress.com
Spam email has accounted for a high percentage of email traffic and has created problems
worldwide. The deep learning transformer model is an efficient tool in natural language …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

A review of spam email detection: analysis of spammer strategies and the dataset shift problem

F Jáñez-Martino, R Alaiz-Rodríguez… - Artificial Intelligence …, 2023 - Springer
Spam emails have been traditionally seen as just annoying and unsolicited emails
containing advertisements, but they increasingly include scams, malware or phishing. In …

Novel enhanced-grey wolf optimization hybrid machine learning technique for biomedical data computation

C Chakraborty, A Kishor, JJPC Rodrigues - Computers and Electrical …, 2022 - Elsevier
Today, a significant number of biomedical data is generated continuously from various
biomedical equipment and experiments due to rapid technological improvements in medical …

Intrusion Detection System to Advance Internet of Things Infrastructure‐Based Deep Learning Algorithms

H Alkahtani, THH Aldhyani - Complexity, 2021 - Wiley Online Library
Smart grids, advanced information technology, have become the favored intrusion targets
due to the Internet of Things (IoT) using sensor devices to collect data from a smart grid …

Cloud-based email phishing attack using machine and deep learning algorithm

UA Butt, R Amin, H Aldabbas, S Mohan… - Complex & Intelligent …, 2023 - Springer
Cloud computing refers to the on-demand availability of personal computer system assets,
specifically data storage and processing power, without the client's input. Emails are …

Machine learning based PV power generation forecasting in alice springs

K Mahmud, S Azam, A Karim, S Zobaed… - IEEE …, 2021 - ieeexplore.ieee.org
The generation volatility of photovoltaics (PVs) has created several control and operation
challenges for grid operators. For a secure and reliable day or hour-ahead electricity …