Switch to: References

Add citations

You must login to add citations.
  1. Comprehensive Review on Advanced Adversarial Attack and Defense Strategies in Deep Neural Network (8th edition). [REVIEW]Smith Oliver & Brown Anderson - 2023 - International Journal of Research and Innovation in Applied Science:156-166.
    In adversarial machine learning, attackers add carefully crafted perturbations to input, where the perturbations are almost imperceptible to humans, but can cause models to make wrong predictions. In this paper, we did comprehensive review of some of the most recent research, advancement and discoveries on adversarial attack, adversarial sampling generation, the potency or effectiveness of each of the existing attack methods, we also did comprehensive review on some of the most recent research, advancement and discoveries on adversarial defense strategies, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Comparative Analysis of Deep Learning and Naïve Bayes for Language Processing Task.Olalere Abiodun - forthcoming - International Journal of Research and Innovation in Applied Sciences.
    Text classification is one of the most important task in natural language processing, In this research, we carried out several experimental research on three (3) of the most popular Text classification NLP classifier in Convolutional Neural Network (CNN), Multinomial Naive Bayes (MNB), and Support Vector Machine (SVN). In the presence of enough training data, Deep Learning CNN work best in all parameters for evaluation with 77% accuracy, followed by SVM with accuracy of 76%, and multinomial Bayes with least performance of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows its (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations