Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (70)
  • Open Access

    ARTICLE

    Credit Card Fraud Detection on Original European Credit Card Holder Dataset Using Ensemble Machine Learning Technique

    Yih Bing Chu*, Zhi Min Lim, Bryan Keane, Ping Hao Kong, Ahmed Rafat Elkilany, Osama Hisham Abusetta

    Journal of Cyber Security, Vol.5, pp. 33-46, 2023, DOI:10.32604/jcs.2023.045422

    Abstract The proliferation of digital payment methods facilitated by various online platforms and applications has led to a surge in financial fraud, particularly in credit card transactions. Advanced technologies such as machine learning have been widely employed to enhance the early detection and prevention of losses arising from potentially fraudulent activities. However, a prevalent approach in existing literature involves the use of extensive data sampling and feature selection algorithms as a precursor to subsequent investigations. While sampling techniques can significantly reduce computational time, the resulting dataset relies on generated data and the accuracy of the pre-processing machine learning models employed. Such… More >

  • Open Access

    ARTICLE

    Ensemble 1D DenseNet Damage Identification Method Based on Vibration Acceleration

    Chun Sha1,*, Chaohui Yue2, Wenchen Wang3

    Structural Durability & Health Monitoring, Vol.17, No.5, pp. 369-381, 2023, DOI:10.32604/sdhm.2023.027948

    Abstract Convolution neural networks in deep learning can solve the problem of damage identification based on vibration acceleration. By combining multiple 1D DenseNet submodels, a new ensemble learning method is proposed to improve identification accuracy. 1D DenseNet is built using standard 1D CNN and DenseNet basic blocks, and the acceleration data obtained from multiple sampling points is brought into the 1D DenseNet training to generate submodels after offset sampling. When using submodels for damage identification, the voting method ideas in ensemble learning are used to vote on the results of each submodel, and then vote centrally. Finally, the cantilever damage problem… More >

  • Open Access

    ARTICLE

    A Novel Ensemble Learning System for Cyberattack Classification

    Óscar Mogollón-Gutiérrez*, José Carlos Sancho Núñez, Mar Ávila Vegas, Andrés Caro Lindo

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1691-1709, 2023, DOI:10.32604/iasc.2023.039255

    Abstract Nowadays, IT systems rely mainly on artificial intelligence (AI) algorithms to process data. AI is generally used to extract knowledge from stored information and, depending on the nature of data, it may be necessary to apply different AI algorithms. In this article, a novel perspective on the use of AI to ensure the cybersecurity through the study of network traffic is presented. This is done through the construction of a two-stage cyberattack classification ensemble model addressing class imbalance following a one-vs-rest (OvR) approach. With the growing trend of cyberattacks, it is essential to implement techniques that ensure legitimate access to… More >

  • Open Access

    ARTICLE

    Detecting Ethereum Ponzi Schemes Through Opcode Context Analysis and Oversampling-Based AdaBoost Algorithm

    Mengxiao Wang1,2, Jing Huang1,2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1023-1042, 2023, DOI:10.32604/csse.2023.039569

    Abstract Due to the anonymity of blockchain, frequent security incidents and attacks occur through it, among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses. Machine learning-based methods are believed to be promising for detecting ethereum Ponzi schemes. However, there are still some flaws in current research, e.g., insufficient feature extraction of Ponzi scheme smart contracts, without considering class imbalance. In addition, there is room for improvement in detection precision. Aiming at the above problems, this paper proposes an ethereum Ponzi scheme detection scheme through opcode context analysis and adaptive boosting (AdaBoost) algorithm.… More >

  • Open Access

    ARTICLE

    Ensemble Learning for Fetal Health Classification

    Mesfer Al Duhayyim1,*, Sidra Abbas2, Abdullah Al Hejaili3, Natalia Kryvinska4,*, Ahmad Almadhor5, Huma Mughal6

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 823-842, 2023, DOI:10.32604/csse.2023.037488

    Abstract : Cardiotocography (CTG) represents the fetus’s health inside the womb during labor. However, assessment of its readings can be a highly subjective process depending on the expertise of the obstetrician. Digital signals from fetal monitors acquire parameters (i.e., fetal heart rate, contractions, acceleration). Objective:: This paper aims to classify the CTG readings containing imbalanced healthy, suspected, and pathological fetus readings. Method:: We perform two sets of experiments. Firstly, we employ five classifiers: Random Forest (RF), Adaptive Boosting (AdaBoost), Categorical Boosting (CatBoost), Extreme Gradient Boosting (XGBoost), and Light Gradient Boosting Machine (LGBM) without over-sampling to classify CTG readings into three categories:… More >

  • Open Access

    ARTICLE

    Ensemble Deep Learning Framework for Situational Aspects-Based Annotation and Classification of International Student’s Tweets during COVID-19

    Shabir Hussain1, Muhammad Ayoub2, Yang Yu1, Junaid Abdul Wahid1, Akmal Khan3, Dietmar P. F. Moller4, Hou Weiyan1,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5355-5377, 2023, DOI:10.32604/cmc.2023.036779

    Abstract As the COVID-19 pandemic swept the globe, social media platforms became an essential source of information and communication for many. International students, particularly, turned to Twitter to express their struggles and hardships during this difficult time. To better understand the sentiments and experiences of these international students, we developed the Situational Aspect-Based Annotation and Classification (SABAC) text mining framework. This framework uses a three-layer approach, combining baseline Deep Learning (DL) models with Machine Learning (ML) models as meta-classifiers to accurately predict the sentiments and aspects expressed in tweets from our collected Student-COVID-19 dataset. Using the proposed aspect2class annotation algorithm, we… More >

  • Open Access

    ARTICLE

    An Improved Ensemble Learning Approach for Heart Disease Prediction Using Boosting Algorithms

    Shahid Mohammad Ganie1, Pijush Kanti Dutta Pramanik2, Majid Bashir Malik3, Anand Nayyar4, Kyung Sup Kwak5,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3993-4006, 2023, DOI:10.32604/csse.2023.035244

    Abstract Cardiovascular disease is among the top five fatal diseases that affect lives worldwide. Therefore, its early prediction and detection are crucial, allowing one to take proper and necessary measures at earlier stages. Machine learning (ML) techniques are used to assist healthcare providers in better diagnosing heart disease. This study employed three boosting algorithms, namely, gradient boost, XGBoost, and AdaBoost, to predict heart disease. The dataset contained heart disease-related clinical features and was sourced from the publicly available UCI ML repository. Exploratory data analysis is performed to find the characteristics of data samples about descriptive and inferential statistics. Specifically, it was… More >

  • Open Access

    ARTICLE

    Reinforcement Learning with an Ensemble of Binary Action Deep Q-Networks

    A. M. Hafiz1, M. Hassaballah2,3,*, Abdullah Alqahtani3, Shtwai Alsubai3, Mohamed Abdel Hameed4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2651-2666, 2023, DOI:10.32604/csse.2023.031720

    Abstract With the advent of Reinforcement Learning (RL) and its continuous progress, state-of-the-art RL systems have come up for many challenging and real-world tasks. Given the scope of this area, various techniques are found in the literature. One such notable technique, Multiple Deep Q-Network (DQN) based RL systems use multiple DQN-based-entities, which learn together and communicate with each other. The learning has to be distributed wisely among all entities in such a scheme and the inter-entity communication protocol has to be carefully designed. As more complex DQNs come to the fore, the overall complexity of these multi-entity systems has increased many… More >

  • Open Access

    ARTICLE

    Adaptive Kernel Firefly Algorithm Based Feature Selection and Q-Learner Machine Learning Models in Cloud

    I. Mettildha Mary1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2667-2685, 2023, DOI:10.32604/csse.2023.031114

    Abstract CC’s (Cloud Computing) networks are distributed and dynamic as signals appear/disappear or lose significance. MLTs (Machine learning Techniques) train datasets which sometime are inadequate in terms of sample for inferring information. A dynamic strategy, DevMLOps (Development Machine Learning Operations) used in automatic selections and tunings of MLTs result in significant performance differences. But, the scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. RFEs (Recursive Feature Eliminations) are computationally very expensive in its operations as it traverses through each feature without considering correlations between them. This problem can… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE)

    Lelisa Adeba Jilcha1, Deuk-Hun Kim2, Julian Jang-Jaccard3, Jin Kwak4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3261-3284, 2023, DOI:10.32604/csse.2023.037615

    Abstract Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.… More >

Displaying 11-20 on page 2 of 70. Per Page