All Stories

  1. UAV (Unmanned Aerial Vehicle): Diverse Applications of UAV Datasets in Segmentation, Classification, Detection, and Tracking
  2. Physics Guided Neural Networks with Knowledge Graph
  3. Breast Cancer Detection and Localizing the Mass Area Using Deep Learning
  4. A Cross-Domain Exploration of Audio and Textual Data for Multi-Modal Emotion Detection
  5. DetectPLD: A Federated CNN Approach for Collaborative Potato Leaf Disease Detection
  6. Security threats on Data-Driven Approaches for Luggage Screening
  7. NCAT12-DET: A New Benchmark Dataset for Surface Defect Detection and a Comparative Study
  8. A Data-Driven Approach for Performance Evaluation of Autonomous eVTOLs
  9. Survey on Machine Learning Biases and Mitigation Techniques
  10. Challenges and Opportunities of Computational Intelligence in Industrial Control System (ICS)
  11. Cyber Security Issues in the Industrial Applications of Digital Twins
  12. Efficient Deep Learning-Based Data-Centric Approach for Autism Spectrum Disorder Diagnosis from Facial Images Using Explainable AI
  13. Behavioral recommendation engine driven by only non-identifiable user data
  14. Data Driven Approaches on Medical Imaging
  15. Empirical Study of Autism Spectrum Disorder Diagnosis Using Facial Images by Improved Transfer Learning Approach
  16. Accurate Numerical Treatment on a Stochastic SIR Epidemic Model with Optimal Control Strategy
  17. Adversarial Attacks and Defenses for Deployed AI Models
  18. A Modified Iterative Algorithm for Numerical Investigation of HIV Infection Dynamics
  19. Negative Selection Algorithm Research and Applications in the Last Decade: A Review
  20. Promise of AI in DeFi, a Systematic Review
  21. A clustering-based active learning method to query informative and representative samples
  22. Interpretable Learning Model for Lower Dimensional Feature Space: A Case study with Brown Spot Detection in Rice Leaf
  23. Dual-filtering (DF) schemes for learning systems to prevent adversarial attacks
  24. An Online Unsupervised Streaming Features Selection Through Dynamic Feature Clustering
  25. A Safer Approach to Build Recommendation Systems on Unidentifiable Data
  26. Promise of AI in Defi, A Literary Analysis
  27. Promise of AI in Defi, A Literary Analysis
  28. Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review
  29. Effect of Data Scaling Methods on Machine Learning Algorithms and Model Performance
  30. Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks
  31. Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning
  32. A Review on Comparative Remarks, Performance Evaluation and Improvement Strategies of Quadrotor Controllers
  33. Evaluating the Performance of Eigenface, Fisherface, and Local Binary Pattern Histogram-Based Facial Recognition Methods under Various Weather Conditions
  34. Recommend Speciality Doctor from Health Transcription: Ensemble Machine Learning Approach
  35. Understanding the Pandemic Through Mining Covid News Using Natural Language Processing
  36. Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques
  37. “Can NLP techniques be utilized as a reliable tool for medical science?” - Building a NLP Framework to Classify Medical Reports
  38. COVID-19 Symptoms Detection Based on NasNetMobile with Explainable AI Using Various Imaging Modalities
  39. Adversarial Input Detection Using Image Processing Techniques (IPT)
  40. CIDMP: Completely Interpretable Detection of Malaria Parasite in Red Blood Cells using Lower-dimensional Feature Space
  41. An Empirical Study on Algorithmic Bias
  42. Stylometry as a Reliable Method for Fallback Authentication
  43. Detect Review Manipulation by Leveraging Reviewer Historical Stylometrics in Amazon, Yelp, Facebook and Google Reviews
  44. Shamir's Secret Sharing for Authentication without Reconstructing Password
  45. Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review
  46. Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives
  47. A Hybrid POW-POS Implementation Against 51 percent Attack in Cryptocurrency System
  48. A Genetic Algorithm Approach to Optimize Dispatching for A Microgrid Energy System with Renewable Energy Sources
  49. Map Reduce Implementation for Malicious Websites Classification
  50. Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack
  51. Resolution Enhancement of Electron Microscopic Volume by Volume Restoration Technique
  52. A survey of blockchain from security perspective
  53. Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents