Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Investigation of Android Malware Using Deep Learning Approach

    V. Joseph Raymond1,2,*, R. Jeberson Retna Raj1

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2413-2429, 2023, DOI:10.32604/iasc.2023.030527

    Abstract In recent days the usage of android smartphones has increased extensively by end-users. There are several applications in different categories banking/finance, social engineering, education, sports and fitness, and many more applications. The android stack is more vulnerable compared to other mobile platforms like IOS, Windows, or Blackberry because of the open-source platform. In the Existing system, malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware. The attackers target the victim with various attacks like adware, backdoor, spyware, ransomware, and zero-day exploits and create threat hunts on… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Autoencoder Architecture for Collaborative Filtering Recommendation in IoT Environment

    Thavavel Vaiyapuri*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 487-503, 2021, DOI:10.32604/cmc.2021.015998

    Abstract The era of the Internet of things (IoT) has marked a continued exploration of applications and services that can make people’s lives more convenient than ever before. However, the exploration of IoT services also means that people face unprecedented difficulties in spontaneously selecting the most appropriate services. Thus, there is a paramount need for a recommendation system that can help improve the experience of the users of IoT services to ensure the best quality of service. Most of the existing techniques—including collaborative filtering (CF), which is most widely adopted when building recommendation systems—suffer from rating sparsity and cold-start problems, preventing… More >

Displaying 1-10 on page 1 of 2. Per Page