Abstract: Recently Distributed Denial of Service (DDoS) attacks have increased extensively, taking about 35% of all cyber threats among which the attack characteristic rises around 300% within the ...
Abstract: Face recognition remains challenging, especially with small and imbalanced datasets that reduce feature discriminability and limit generalization. This study investigates Light Convolutional ...
Abstract: In the recent years, cyberbullying has marked its existence and severe consequences especially among the adolescents of age between 12–20 years. Posts promoting cyberbullying spread promptly ...
Abstract: Human activity recognition (HAR) focuses on identifying and classifying human activities based on data collected from various sources. Its importance lies in its wide range of applications, ...
Abstract: The deep learning-based synthetic aperture radar (SAR) image classification model is vulnerable to adversarial attacks. Although automated deep learning (ADL) including neural architecture ...
Abstract: Deepfake technology, using deep learning, creates highly realistic yet artificial media, creating challenges for security and privacy. Convolutional Neural Networks (CNNs) play a crucial ...
Abstract: Facial expression recognition (FER) serves as a fundamental component of human-computer interaction, showing its influence on computing, and behavioral analysis. The proposed work here ...
Abstract: Prompt diagnosis of plant disease at an early stage is crucial for sustainable agriculture and food security. Deep learning approaches, more specifically convolutional neural networks (CNNs) ...
Abstract: Reliable fault diagnosis in power transformers is paramount for ensuring grid stability and safeguarding critical assets. This paper proposes a novel deep learning-based diagnostic framework ...
Abstract: Breast ultrasound imaging (BUS) plays a major role in the diagnosis of breast cancer. Consequently, computerised analysis of BUS images is being intensively investigated as a means to assist ...
Abstract: Cybersecurity risks have evolved in the linked digital terrain of today into more complex, frequent, and varied forms. Conventional intrusion detection systems sometimes find it difficult to ...