Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (35)
  • Open Access

    ARTICLE

    An Example of a Supporting Combination by Using GA to Evolve More Advanced and Deeper CNN Architecture

    Bah Mamoudou*

    Journal on Artificial Intelligence, Vol.5, pp. 163-180, 2023, DOI:10.32604/jai.2023.045324

    Abstract It has become an annual tradition for Convolutional Neural Networks (CNNs) to continuously improve their performance in image classification and other applications. These advancements are often attributed to the adoption of more intricate network architectures, such as modules and skip connections, as well as the practice of stacking additional layers to create increasingly complex networks. However, the quest to identify the most optimized model is a daunting task, given that state of the art Convolutional Neural Network (CNN) models are manually engineered. In this research paper, we leveraged a conventional Genetic Algorithm (GA) to craft optimized Convolutional Neural Network (CNN)… More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can classify the DDoS attack traffic… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here the purpose of the study… More >

  • Open Access

    ARTICLE

    Intrusion Detection System Through Deep Learning in Routing MANET Networks

    Zainab Ali Abbood1,2,*, Doğu Çağdaş Atilla3,4, Çağatay Aydin5

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 269-281, 2023, DOI:10.32604/iasc.2023.035276

    Abstract Deep learning (DL) is a subdivision of machine learning (ML) that employs numerous algorithms, each of which provides various explanations of the data it consumes; mobile ad-hoc networks (MANET) are growing in prominence. For reasons including node mobility, due to MANET’s potential to provide small-cost solutions for real-world contact challenges, decentralized management, and restricted bandwidth, MANETs are more vulnerable to security threats. When protecting MANETs from attack, encryption and authentication schemes have their limits. However, deep learning (DL) approaches in intrusion detection systems (IDS) can adapt to the changing environment of MANETs and allow a system to make intrusion decisions… More >

  • Open Access

    ARTICLE

    A Data Driven Security Correction Method for Power Systems with UPFC

    Qun Li, Ningyu Zhang*, Jianhua Zhou, Xinyao Zhu, Peng Li

    Energy Engineering, Vol.120, No.6, pp. 1485-1502, 2023, DOI:10.32604/ee.2023.022856

    Abstract The access of unified power flow controllers (UPFC) has changed the structure and operation mode of power grids all across the world, and it has brought severe challenges to the traditional real-time calculation of security correction based on traditional models. Considering the limitation of computational efficiency regarding complex, physical models, a data-driven power system security correction method with UPFC is, in this paper, proposed. Based on the complex mapping relationship between the operation state data and the security correction strategy, a two-stage deep neural network (DNN) learning framework is proposed, which divides the offline training task of security correction into… More >

  • Open Access

    ARTICLE

    Non-Contact Physiological Measurement System for Wearing Masks During the Epidemic

    Shu-Yin Chiang*, Dong-Ye Wu

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2509-2526, 2023, DOI:10.32604/cmc.2023.036466

    Abstract Physiological signals indicate a person’s physical and mental state at any given time. Accordingly, many studies extract physiological signals from the human body with non-contact methods, and most of them require facial feature points. However, under COVID-19, wearing a mask has become a must in many places, so how non-contact physiological information measurements can still be performed correctly even when a mask covers the facial information has become a focus of research. In this study, RGB and thermal infrared cameras were used to execute non-contact physiological information measurement systems for heart rate, blood pressure, respiratory rate, and forehead temperature for… More >

  • Open Access

    ARTICLE

    Generalized Jaccard Similarity Based Recurrent DNN for Virtualizing Social Network Communities

    R. Gnanakumari1,*, P. Vijayalakshmi2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2719-2730, 2023, DOI:10.32604/iasc.2023.034145

    Abstract In social data analytics, Virtual Community (VC) detection is a primary challenge in discovering user relationships and enhancing social recommendations. VC formation is used for personal interaction between communities. But the usual methods didn’t find the Suspicious Behaviour (SB) needed to make a VC. The Generalized Jaccard Suspicious Behavior Similarity-based Recurrent Deep Neural Network Classification and Ranking (GJSBS-RDNNCR) Model addresses these issues. The GJSBS-RDNNCR model comprises four layers for VC formation in Social Networks (SN). In the GJSBS-RDNNCR model, the SN is given as an input at the input layer. After that, the User’s Behaviors (UB) are extracted in the… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm

    D. Vidyabharathi1,*, V. Mohanraj2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2559-2573, 2023, DOI:10.32604/iasc.2023.032255

    Abstract For training the present Neural Network (NN) models, the standard technique is to utilize decaying Learning Rates (LR). While the majority of these techniques commence with a large LR, they will decay multiple times over time. Decaying has been proved to enhance generalization as well as optimization. Other parameters, such as the network’s size, the number of hidden layers, dropouts to avoid overfitting, batch size, and so on, are solely based on heuristics. This work has proposed Adaptive Teaching Learning Based (ATLB) Heuristic to identify the optimal hyperparameters for diverse networks. Here we consider three architectures Recurrent Neural Networks (RNN),… More >

  • Open Access

    ARTICLE

    Adaptive Backdoor Attack against Deep Neural Networks

    Honglu He, Zhiying Zhu, Xinpeng Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2617-2633, 2023, DOI:10.32604/cmes.2023.025923

    Abstract In recent years, the number of parameters of deep neural networks (DNNs) has been increasing rapidly. The training of DNNs is typically computation-intensive. As a result, many users leverage cloud computing and outsource their training procedures. Outsourcing computation results in a potential risk called backdoor attack, in which a welltrained DNN would perform abnormally on inputs with a certain trigger. Backdoor attacks can also be classified as attacks that exploit fake images. However, most backdoor attacks design a uniform trigger for all images, which can be easily detected and removed. In this paper, we propose a novel adaptive backdoor attack.… More >

  • Open Access

    REVIEW

    Edge Intelligence with Distributed Processing of DNNs: A Survey

    Sizhe Tang1, Mengmeng Cui1,*, Lianyong Qi2, Xiaolong Xu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 5-42, 2023, DOI:10.32604/cmes.2023.023684

    Abstract With the rapid development of deep learning, the size of data sets and deep neural networks (DNNs) models are also booming. As a result, the intolerable long time for models’ training or inference with conventional strategies can not meet the satisfaction of modern tasks gradually. Moreover, devices stay idle in the scenario of edge computing (EC), which presents a waste of resources since they can share the pressure of the busy devices but they do not. To address the problem, the strategy leveraging distributed processing has been applied to load computation tasks from a single processor to a group of… More >

Displaying 1-10 on page 1 of 35. Per Page