Deep learning: Systematic review, models, challenges, and research directions
T Talaei Khoei, H Ould Slimane… - Neural Computing and …, 2023 - Springer
The current development in deep learning is witnessing an exponential transition into
automation applications. This automation transition can provide a promising framework for …
automation applications. This automation transition can provide a promising framework for …
[HTML][HTML] Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
Abstract The Internet of Things (IoT) has transformed many aspects of modern life, from
healthcare and transportation to home automation and industrial control systems. However …
healthcare and transportation to home automation and industrial control systems. However …
Network anomaly intrusion detection based on deep learning approach
YC Wang, YC Houng, HX Chen, SM Tseng - Sensors, 2023 - mdpi.com
The prevalence of internet usage leads to diverse internet traffic, which may contain
information about various types of internet attacks. In recent years, many researchers have …
information about various types of internet attacks. In recent years, many researchers have …
A Deep learning-based innovative technique for phishing detection in modern security with uniform resource locators
EA Aldakheel, M Zakariah, GA Gashgari, FA Almarshad… - Sensors, 2023 - mdpi.com
Organizations and individuals worldwide are becoming increasingly vulnerable to
cyberattacks as phishing continues to grow and the number of phishing websites grows. As …
cyberattacks as phishing continues to grow and the number of phishing websites grows. As …
Artificial intelligence-based malware detection, analysis, and mitigation
Malware, a lethal weapon of cyber attackers, is becoming increasingly sophisticated, with
rapid deployment and self-propagation. In addition, modern malware is one of the most …
rapid deployment and self-propagation. In addition, modern malware is one of the most …
Graph-based deep learning techniques for remote sensing applications: Techniques, taxonomy, and applications—A comprehensive review
In the last decade, there has been a significant surge of interest in machine learning,
primarily driven by advancements in deep learning (DL). DL has emerged as a powerful …
primarily driven by advancements in deep learning (DL). DL has emerged as a powerful …
[PDF][PDF] Unifying the perspectives of nlp and software engineering: A survey on language models for code
Z Zhang, C Chen, B Liu, C Liao, Z Gong… - arXiv preprint arXiv …, 2023 - simg.baai.ac.cn
In this work we systematically review the recent advancements in code processing with
language models, covering 50+ models, 30+ evaluation tasks, 170+ datasets, and 700 …
language models, covering 50+ models, 30+ evaluation tasks, 170+ datasets, and 700 …
[HTML][HTML] A new deep boosted CNN and ensemble learning based IoT malware detection
Security issues are threatened in various types of networks, especially in the Internet of
Things (IoT) environment that requires early detection. IoT is the network of real-time devices …
Things (IoT) environment that requires early detection. IoT is the network of real-time devices …
SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features
Ransomware has been largely exploited by cybercriminals to target individuals and
organizations. In response to the increasing number and magnitude of ransomware attacks …
organizations. In response to the increasing number and magnitude of ransomware attacks …
Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection
During the last decade, the cybersecurity literature has conferred a high-level role to
machine learning as a powerful security paradigm to recognise malicious software in …
machine learning as a powerful security paradigm to recognise malicious software in …