All Stories

  1. Physics Guided Neural Networks with Knowledge Graph
  2. Breast Cancer Detection and Localizing the Mass Area Using Deep Learning
  3. A Cross-Domain Exploration of Audio and Textual Data for Multi-Modal Emotion Detection
  4. DetectPLD: A Federated CNN Approach for Collaborative Potato Leaf Disease Detection
  5. Security threats on Data-Driven Approaches for Luggage Screening
  6. NCAT12-DET: A New Benchmark Dataset for Surface Defect Detection and a Comparative Study
  7. A Data-Driven Approach for Performance Evaluation of Autonomous eVTOLs
  8. Survey on Machine Learning Biases and Mitigation Techniques
  9. Challenges and Opportunities of Computational Intelligence in Industrial Control System (ICS)
  10. Cyber Security Issues in the Industrial Applications of Digital Twins
  11. Efficient Deep Learning-Based Data-Centric Approach for Autism Spectrum Disorder Diagnosis from Facial Images Using Explainable AI
  12. Behavioral recommendation engine driven by only non-identifiable user data
  13. Data Driven Approaches on Medical Imaging
  14. Empirical Study of Autism Spectrum Disorder Diagnosis Using Facial Images by Improved Transfer Learning Approach
  15. Accurate Numerical Treatment on a Stochastic SIR Epidemic Model with Optimal Control Strategy
  16. Adversarial Attacks and Defenses for Deployed AI Models
  17. A Modified Iterative Algorithm for Numerical Investigation of HIV Infection Dynamics
  18. Negative Selection Algorithm Research and Applications in the Last Decade: A Review
  19. Promise of AI in DeFi, a Systematic Review
  20. A clustering-based active learning method to query informative and representative samples
  21. Interpretable Learning Model for Lower Dimensional Feature Space: A Case study with Brown Spot Detection in Rice Leaf
  22. Dual-filtering (DF) schemes for learning systems to prevent adversarial attacks
  23. An Online Unsupervised Streaming Features Selection Through Dynamic Feature Clustering
  24. A Safer Approach to Build Recommendation Systems on Unidentifiable Data
  25. Promise of AI in Defi, A Literary Analysis
  26. Promise of AI in Defi, A Literary Analysis
  27. Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review
  28. Effect of Data Scaling Methods on Machine Learning Algorithms and Model Performance
  29. Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
  30. Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning
  31. A Review on Comparative Remarks, Performance Evaluation and Improvement Strategies of Quadrotor Controllers
  32. Evaluating the Performance of Eigenface, Fisherface, and Local Binary Pattern Histogram-Based Facial Recognition Methods under Various Weather Conditions
  33. Recommend Speciality Doctor from Health Transcription: Ensemble Machine Learning Approach
  34. Understanding the Pandemic Through Mining Covid News Using Natural Language Processing
  35. Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques
  36. “Can NLP techniques be utilized as a reliable tool for medical science?” - Building a NLP Framework to Classify Medical Reports
  37. COVID-19 Symptoms Detection Based on NasNetMobile with Explainable AI Using Various Imaging Modalities
  38. Adversarial Input Detection Using Image Processing Techniques (IPT)
  39. CIDMP: Completely Interpretable Detection of Malaria Parasite in Red Blood Cells using Lower-dimensional Feature Space
  40. An Empirical Study on Algorithmic Bias
  41. Stylometry as a Reliable Method for Fallback Authentication
  42. Detect Review Manipulation by Leveraging Reviewer Historical Stylometrics in Amazon, Yelp, Facebook and Google Reviews
  43. Shamir's Secret Sharing for Authentication without Reconstructing Password
  44. Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review
  45. Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives
  46. A Hybrid POW-POS Implementation Against 51 percent Attack in Cryptocurrency System
  47. A Genetic Algorithm Approach to Optimize Dispatching for A Microgrid Energy System with Renewable Energy Sources
  48. Map Reduce Implementation for Malicious Websites Classification
  49. Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack
  50. Resolution Enhancement of Electron Microscopic Volume by Volume Restoration Technique
  51. A survey of blockchain from security perspective
  52. Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents