An overview of deep learning architectures, libraries and its applications areas

M Dixit, A Tiwari, H Pathak… - … Conference on Advances …, 2018 - ieeexplore.ieee.org
In today's world, a massive amount of data is available through various fields in the form of
text, images and audio. All this data can be a vast repository of information when analysed to …

Studying machine learning techniques for intrusion detection systems

QV Dang - Future Data and Security Engineering: 6th International …, 2019 - Springer
Intrusion detection systems (IDSs) have been studied widely in the computer security
community for a long time. The recent development of machine learning techniques has …

A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks

N Mohd, A Singh, HS Bhadauria - Wireless Personal Communications, 2020 - Springer
It is well known that the safety, reliability and energy efficiencies are the prime concerns
while designing and deploying wireless sensor networks. Therefore, unattained features …

A face recognition software framework based on principal component analysis

P Peng, I Portugal, P Alencar, D Cowan - Plos one, 2021 - journals.plos.org
Face recognition, as one of the major biometrics identification methods, has been applied in
different fields involving economics, military, e-commerce, and security. Its touchless …

Studying the Reinforcement Learning techniques for the problem of intrusion detection

QV Dang, TH Vo - … Conference on Artificial Intelligence and Big …, 2021 - ieeexplore.ieee.org
The intrusion detection problem is one of the core problems in cyber-security. In recent
years, there are many research studies that leverage the power of supervised machine …

DragStream: an anomaly and concept drift detector in univariate data streams

AMSN Bibinbe, AJ Mahamadou… - … Conference on Data …, 2022 - ieeexplore.ieee.org
Anomaly detection in data streams comes with different technical challenges due to the data
nature. The main challenges include storage limitations, the speed of data arrival, and …

Design and analysis of intrusion detection system via neural network, SVM, and neuro-fuzzy

A Tiwari, SK Ojha - Emerging Technologies in Data Mining and Information …, 2019 - Springer
An intrusion detection system is continuous observation of system or over the network
assessment of an intruder or any other attacks. In this paper, design, and analysis of …

Multidisciplinary approach of artificial intelligence over medical imaging: a review, challenges, recent opportunities for research

A Tiwari, M Chaudhari, A Rai - … conference on I-SMAC (IoT in …, 2019 - ieeexplore.ieee.org
Multidisciplinary approach of artificial intelligence is revolutionizing the traditional
technologies used in medical image computing, radiology imaging, medical diagnoses and …

Multidimensional Medical Imaging Analysis Alzheimer's Disease via Image Processing and Machine Learning: A Review, Diagnosis and Challenges

A Tiwari - Proceedings of the International Conference on …, 2020 - papers.ssrn.com
Alzheimer ailment is forward moving mind issue dementia, neurodegenerative, irreversible
infection. Dementia is fundamental driver of Alzheimer's sickness which impact the day by …

[PDF][PDF] Classification of Alzheimer's MRI Scans using Convolutional Neural Networks

A Ali, A Tiwari, A Kumar, D Dixit - academia.edu
Alzheimer's disease is an irreversible, progressive brain disorder that slowly destroys
memory and thinking skills. Image processing and deep learning are widely used in the …