All Stories

  1. DRD-GAN: A Novel Distributed Conditional Wasserstein Deep Convolutional Relativistic Discriminator GAN with Improved Convergence
  2. Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques
  3. AI-Powered Ransomware Detection Framework
  4. Adversarial Input Detection Using Image Processing Techniques (IPT)
  5. An Empirical Study on Algorithmic Bias
  6. Shamir's Secret Sharing for Authentication without Reconstructing Password
  7. Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives
  8. A Comparative Evaluation of Local Feature Descriptors for DeepFakes Detection
  9. A survey of blockchain from security perspective
  10. Face Authenticity: An Overview of Face Manipulation Generation, Detection and Recognition
  11. A Framework for Analyzing Ransomware using Machine Learning
  12. Biometrics and its use: Viewpoint
  13. Authentication Basics
  14. Continuous Authentication
  15. Negative Authentication Systems
  16. Multi-Factor Authentication
  17. OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid
  18. Artificial Immune Systems
  19. A Cyber-Security Storm MAP
  20. Password Security through Negative Filtering
  21. Immunological Computation
  22. Artificial Immune Systems and Their Applications
  23. Evolutionary Algorithms in Engineering Applications
  24. Evolutionary Algorithms — An Overview
  25. Artificial Immune Systems