Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2023
Triplet-trained graph transformer with control flow graph for few-shot malware classification
Information Sciences: an International Journal (ISCI), Volume 649, Issue Chttps://doi.org/10.1016/j.ins.2023.119598AbstractThe exponential proliferation of malware requires robust detection mechanisms for the security of global enterprises and national infrastructures. Conventional malware classification methods primarily depend on extensive datasets of ...
- research-articleOctober 2023
Malware classification with disentangled representation learning of evolutionary triplet network
Highlights- We propose a novel deep learning model for classifying malicious software.
- It ...
Malware is a significant threat to the security of computer systems and networks worldwide, and its sophistication and diversity continue to increase over time. One of the key challenges in malware detection and classification is the ...
- ArticleSeptember 2023
A Causally Explainable Deep Learning Model with Modular Bayesian Network for Predicting Electric Energy Demand
AbstractEfficient management of residential power consumption, particularly during peak demand, poses significant challenges. Deep learning models excel in predicting electricity demand but lack of interpretability due to the interdependent nature of ...
- research-articleApril 2023
A graph convolution network with subgraph embedding for mutagenic prediction in aromatic hydrocarbons
Highlights- We propose a new graph convolution network with subgraph embedding.
- It extracts ...
An aromatic hydrocarbon refers to an organic material having a carbon ring such as benzene and a functional group in the carbon ring. As the industry develops, natural pollution becomes harsh, new compounds emerge, and the exposure to ...
- ArticleSeptember 2022
A Neuro-Symbolic AI System for Visual Question Answering in Pedestrian Video Sequences
AbstractWith the rapid increase in the amount of video data, efficient object recognition is mandatory for a system capable of automatically performing question and answering. In particular, real-world video environments with numerous types of objects and ...
- ArticleSeptember 2022
Evolutionary Triplet Network of Learning Disentangled Malware Space for Malware Classification
AbstractWith the advent of sophisticated deep learning models, various methods for classifying malware from structural features of source codes have been devised. Nevertheless, recent advanced detection-avoidance techniques actively imitate structural ...
- ArticleNovember 2021
Directional Graph Transformer-Based Control Flow Embedding for Malware Classification
Intelligent Data Engineering and Automated Learning – IDEAL 2021Pages 426–436https://doi.org/10.1007/978-3-030-91608-4_42AbstractConsidering the fatality of malware attacks, the data-driven approach using massive malware observations has been verified. Deep learning-based approaches to learn the unified features by exploiting the local and sequential nature of control flow ...
- ArticleNovember 2021
Learning Dynamic Connectivity with Residual-Attention Network for Autism Classification in 4D fMRI Brain Images
Intelligent Data Engineering and Automated Learning – IDEAL 2021Pages 387–396https://doi.org/10.1007/978-3-030-91608-4_38AbstractDiagnosing autism spectrum disorder (ASD) is still challenging because of its complex disorder and insufficient evidence to diagnose. A recent research in psychiatry perspective demonstrates that there are no obvious reasons for ASD. However, ...
- ArticleSeptember 2021
- ArticleNovember 2020
Automated Learning of In-vehicle Noise Representation with Triplet-Loss Embedded Convolutional Beamforming Network
Intelligent Data Engineering and Automated Learning – IDEAL 2020Pages 507–515https://doi.org/10.1007/978-3-030-62365-4_48AbstractIn spite of various deep learning models devised, it is still a challenging task to classify in-vehicle noise because of the reverberation and the variance in the low-frequency band generated from the narrow interior space. Considering the ...
- ArticleNovember 2020
A Deep Metric Neural Network with Disentangled Representation for Detecting Smartphone Glass Defects
Intelligent Data Engineering and Automated Learning – IDEAL 2020Pages 485–494https://doi.org/10.1007/978-3-030-62365-4_46AbstractFor defect inspection using computer vision, deep learning models have been introduced to improve the conventional rule-based pattern analysis. A lot of data is a prerequisite to the success of them, but the on-the-spot industrial field suffers ...
- research-articleFebruary 2020
A convolutional neural-based learning classifier system for detecting database intrusion via insider attack
Information Sciences: an International Journal (ISCI), Volume 512, Issue CPages 123–136https://doi.org/10.1016/j.ins.2019.09.055Highlights- This paper proposes a new hybrid method called CN-LCS of deep learning and learning classifier system.
Role-based access control (RBAC) in databases provides a valuable level of abstraction to promote security administration at the business enterprise level. With the capacity for adaptation and learning, machine learning algorithms are ...
- ArticleNovember 2019
A Deep Learning-Based Surface Defect Inspection System for Smartphone Glass
Intelligent Data Engineering and Automated Learning – IDEAL 2019Pages 375–385https://doi.org/10.1007/978-3-030-33607-3_41AbstractIn recent years, convolutional neural network has become a solution to many image processing problems due to high performance. It is particularly useful for applications in automated optical inspection systems related to industrial applications. ...
- ArticleSeptember 2019
Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack
AbstractA database Intrusion Detection System (IDS) based on Role-based Access Control (RBAC) mechanism that has capability of learning and adaptation learns SQL transaction patterns represented by roles to detect insider attacks. In this paper, we ...
- ArticleNovember 2018
Learning Optimal Q-Function Using Deep Boltzmann Machine for Reliable Trading of Cryptocurrency
Intelligent Data Engineering and Automated Learning – IDEAL 2018Pages 468–480https://doi.org/10.1007/978-3-030-03493-1_49AbstractThe explosive price volatility from the end of 2017 to January 2018 shows that bitcoin is a high risk asset. The deep reinforcement algorithm is straightforward idea for directly outputs the market management actions to achieve higher profit ...
- research-articleSeptember 2018
Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders
Information Sciences: an International Journal (ISCI), Volume 460, Issue CPages 83–102https://doi.org/10.1016/j.ins.2018.04.092Highlights- This paper proposes a transferred GAN based on a deep autoencoder for malware detection.
Detecting malicious software (malware) is important for computer security. Among the different types of malware, zero-day malware is problematic because it cannot be removed by antivirus systems. Existing malware detection mechanisms ...
- ArticleJune 2018
A Hybrid Deep Learning System of CNN and LRCN to Detect Cyberbullying from SNS Comments
AbstractThe cyberbullying is becoming a significant social issue, in proportion to the proliferation of Social Network Service (SNS). The cyberbullying commentaries can be categorized into syntactic and semantic subsets. In this paper, we propose an ...
- ArticleJune 2018
Hybrid Deep Learning Based on GAN for Classifying BSR Noises from Invehicle Sensors
AbstractBSR (Buzz, squeak, and rattle) noises are essential criteria for the quality of a vehicle. It is necessary to classify them to handle them appropriately. Although many studies have been conducted to classify noise, they suffered some problems: the ...
- ArticleNovember 2017
Malware Detection Using Deep Transferred Generative Adversarial Networks
AbstractMalicious software is generated with more and more modified features of which the methods to detect malicious software use characteristics. Automatic classification of malicious software is efficient because it does not need to store all ...