A review on machine learning styles in computer vision—techniques and future directions

SV Mahadevkar, B Khemani, S Patil, K Kotecha… - Ieee …, 2022 - ieeexplore.ieee.org
Computer applications have considerably shifted from single data processing to machine
learning in recent years due to the accessibility and availability of massive volumes of data …

Noncontact sensing techniques for AI-aided structural health monitoring: a systematic review

A Sabato, S Dabetwar, NN Kulkarni… - IEEE Sensors …, 2023 - ieeexplore.ieee.org
Engineering structures and infrastructure continue to be used despite approaching or having
reached their design lifetime. While contact-based measurement techniques are challenging …

BSFR-SH: Blockchain-enabled security framework against ransomware attacks for smart healthcare

M Wazid, AK Das, S Shetty - IEEE Transactions on Consumer …, 2022 - ieeexplore.ieee.org
Ransomware is a type of malicious program or software that encrypts the contents on a hard
disc and prevents the users from accessing them unless they pay an amount (called a …

A two‐stage deep learning framework for image‐based android malware detection and variant classification

P Yadav, N Menon, V Ravi… - Computational …, 2022 - Wiley Online Library
With the popularity of the internet and smartphones, malware on smartphones has increased
dramatically. In addition, the ubiquity and openness of the Android operating system have …

EfficientNet convolutional neural networks-based Android malware detection

P Yadav, N Menon, V Ravi, S Vishvanathan… - Computers & …, 2022 - Elsevier
Owing to the increasing number and complexity of malware threats, research on automated
malware detection has become a hot topic in the field of network security. Traditional …

Android malware detection methods based on convolutional neural network: A survey

L Shu, S Dong, H Su, J Huang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Android malware detection (AMD) is a challenging task requiring many factors to be
considered during detection, such as feature extraction and processing, performance …

Explainable Artificial Intelligence‐Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine‐Tuned CNN‐Based Transfer Learning Model

H Naeem, BM Alshammari… - Computational Intelligence …, 2022 - Wiley Online Library
Automated malware detection is a prominent issue in the world of network security because
of the rising number and complexity of malware threats. It is time‐consuming and resource …

Enhanced computer network security assessment through employing an integrated logtodim-topsis technique under interval neutrosophic sets

Q Sun, L Yang - … journal of knowledge-based and intelligent …, 2024 - journals.sagepub.com
In the context of the development of the new era, computer network technology has become
an indispensable and important technological means in people's daily work and life …

A high-precision and efficient method for badminton action detection in sports using You Only Look Once with Hourglass Network

W Yang, M Jiang, X Fang, X Shi, Y Guo… - … Applications of Artificial …, 2024 - Elsevier
Standardized striking movements are essential in badminton for enhancing player
techniques and minimizing sports-related injuries. However, accurately detecting these …

A deep convolutional neural network stacked ensemble for malware threat classification in internet of things

H Naeem, X Cheng, F Ullah, S Jabbar… - Journal of Circuits …, 2022 - World Scientific
Malicious attacks to software applications are on the rise as more people use Internet of
things (IoT) devices and high-speed internet. When a software system crash happens …