Switch to: References

Add citations

You must login to add citations.
  1. Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. In this research, we proposed an adaptable (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Use of Machine Learning Methods for Image Classification in Medical Data.Destiny Agboro - forthcoming - International Journal of Ethics.
    Integrating medical imaging with computing technologies, such as Artificial Intelligence (AI) and its subsets: Machine learning (ML) and Deep Learning (DL) has advanced into an essential facet of present-day medicine, signaling a pivotal role in diagnostic decision-making and treatment plans (Huang et al., 2023). The significance of medical imaging is escalated by its sustained growth within the realm of modern healthcare (Varoquaux and Cheplygina, 2022). Nevertheless, the ever-increasing volume of medical images compared to the availability of imaging experts. Biomedical experts (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)Evaluating the level of Press Freedom in Modern Nigeria.Ajijola Samuel - forthcoming - International Journal of Research and Innovation in Social Sciences.
    In this study, press freedom in Nigeria is investigated, together with its recent developments and historical background. It looks at the state of press freedom, highlighting obstacles, worldwide forces that contribute to its restriction and the benefits it provides. Despite legislative restrictions, government control over Nigeria's media has persisted since the Newspaper Ordinance of 1903. The study places press freedom within several theoretical frameworks, such as authoritarian, libertarian, and democratic participant theories, using McQuail's theories of mass communication. Using Google Forms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with Signature-Based Methods. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Comparative Analysis of Deep Learning and Naïve Bayes for Language Processing Task.Olalere Abiodun - forthcoming - International Journal of Research and Innovation in Applied Sciences.
    Text classification is one of the most important task in natural language processing, In this research, we carried out several experimental research on three (3) of the most popular Text classification NLP classifier in Convolutional Neural Network (CNN), Multinomial Naive Bayes (MNB), and Support Vector Machine (SVN). In the presence of enough training data, Deep Learning CNN work best in all parameters for evaluation with 77% accuracy, followed by SVM with accuracy of 76%, and multinomial Bayes with least performance of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Captioning Deep Learning Based Encoder-Decoder through Long Short-Term Memory (LSTM).Grimsby Chelsea - forthcoming - International Journal of Scientific Innovation.
    This work demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate model generality over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey. [REVIEW]Tosin Ige - manuscript
    Phishing is one of the most effective ways in which cybercriminals get sensitive details such as credentials for online banking, digital wallets, state secrets, and many more from potential victims. They do this by spamming users with malicious URLs with the sole purpose of tricking them into divulging sensitive information which is later used for various cybercrimes. In this research, we did a comprehensive review of current state-of-the-art machine learning and deep learning phishing detection techniques to expose their vulnerabilities and (...)
    Download  
     
    Export citation  
     
    Bookmark