A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
Impact of word embedding models on text analytics in deep learning environment: a review
The selection of word embedding and deep learning models for better outcomes is vital.
Word embeddings are an n-dimensional distributed representation of a text that attempts to …
Word embeddings are an n-dimensional distributed representation of a text that attempts to …
A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
A framework for hate speech detection using deep convolutional neural network
The rapid growth of Internet users led to unwanted cyber issues, including cyberbullying,
hate speech, and many more. This article deals with the problems of hate speech on Twitter …
hate speech, and many more. This article deals with the problems of hate speech on Twitter …
Machine learning techniques and older adults processing of online information and misinformation: A covid 19 study
This study is informed by two research gaps. One, Artificial Intelligence's (AI's) Machine
Learning (ML) techniques have the potential to help separate information and …
Learning (ML) techniques have the potential to help separate information and …
Hate speech and offensive language detection in Dravidian languages using deep ensemble framework
Social networking platforms gained widespread popularity and are used for various activities
like: promoting products, sharing news, achievements and many more. On the other hand, it …
like: promoting products, sharing news, achievements and many more. On the other hand, it …
Long short-term memory and fuzzy logic for anomaly detection and mitigation in software-defined network environment
Computer networks become complex and dynamic structures. As a result of this fact, the
configuration and the managing of this whole structure is a challenging activity. Software …
configuration and the managing of this whole structure is a challenging activity. Software …
A spam transformer model for SMS spam detection
In this paper, we aim to explore the possibility of the Transformer model in detecting the
spam Short Message Service (SMS) messages by proposing a modified Transformer model …
spam Short Message Service (SMS) messages by proposing a modified Transformer model …
A hybrid CNN-LSTM model for SMS spam detection in arabic and english messages
Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains
an indisputable communication service in our lives until today. For example, several …
an indisputable communication service in our lives until today. For example, several …
An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation
This paper aims to develop a new efficient framework named Secure Decentralized Training
Framework (SDTF) for Privacy Preserving Deep Learning models. The main feature of the …
Framework (SDTF) for Privacy Preserving Deep Learning models. The main feature of the …