XAI-AMD-DL: An Explainable AI Approach for Android Malware Detection System Using Deep Learning DOI
Santosh K. Smmarwar, Govind P. Gupta, Sanjay Kumar

и другие.

2022 IEEE World Conference on Applied Intelligence and Computing (AIC), Год журнала: 2023, Номер unknown

Опубликована: Июль 29, 2023

Efficient malware identification is essential to safe the system resources and privacy of data for cybersecurity system. The use android smartphones has increased tremendously that attracting various types attacks. Nowadays, writers Artificial Intelligence (AI)-enabled attack techniques bypass detection malicious activities. Hence, designing an efficient, effective robust identify variants remains a critical problem challenge. However, number deep learning (DL) models applied in existing methods at large scale, but these actually lacks interpretability explain contribution each features Therefore, this paper propose Explainable (XAI) based hybrid Convolutional Neural network (CNN) Bi-Gated Recurrent Unit (Bi-GRU) Android Malware Detection (AMD) System using DL named as XAI-AMD-DL. proposed model evaluated CICAndMal2019 dataset. results obtained by XAI-AMD-DL 97.98% accuracy, 97.75 %, 97.76%, 97.75% precision, recall f1score, respectively outperforms models.

Язык: Английский

A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection DOI Creative Commons

Anjum Nazir,

Zulfiqar A. Memon,

Touseef Sadiq

и другие.

Sensors, Год журнала: 2023, Номер 23(19), С. 8153 - 8153

Опубликована: Сен. 28, 2023

The Internet of Things (IoT) and network-enabled smart devices are crucial to the digitally interconnected society present day. However, increased reliance on IoT increases their susceptibility malicious activities within network traffic, posing significant challenges cybersecurity. As a result, both system administrators end users negatively affected by these malevolent behaviours. Intrusion-detection systems (IDSs) commonly deployed as cyber attack defence mechanism mitigate such risks. IDS plays role in identifying preventing hazards networks. development an efficient rapid for detection attacks remains challenging area research. Moreover, datasets contain multiple features, so implementation feature selection (FS) is required design effective timely IDS. FS procedure seeks eliminate irrelevant redundant features from large datasets, thereby improving intrusion-detection system's overall performance. In this paper, we propose hybrid wrapper-based feature-selection algorithm that based concepts Cellular Automata (CA) engine Tabu Search (TS)-based aspiration criteria. We used Random Forest (RF) ensemble learning classifier evaluate fitness selected features. proposed algorithm, CAT-S, was tested TON_IoT dataset. simulation results demonstrate enhances classification accuracy while simultaneously reducing number false positive rate.

Язык: Английский

Процитировано

11

BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network DOI
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu

и другие.

Cluster Computing, Год журнала: 2024, Номер 27(6), С. 8243 - 8268

Опубликована: Апрель 9, 2024

Язык: Английский

Процитировано

4

AI-Powered Predictive Models Transforming the Future of Digital Marketing and Customer Engagement DOI Open Access

CB Bhattacharya

Journal of Informatics Education and Research, Год журнала: 2025, Номер 5(1)

Опубликована: Янв. 17, 2025

A revolutionary chance to improve consumer engagement exists with the incorporation of AI. This proposed delves at various ways generative AI may be used in digital marketing campaigns, highlighting how it can change way customers engage and content is made. Personalized content, made possible by AI's capacity sift through mountains customer data, main emphasis. Chatbots virtual assistants powered artificial intelligence are also investigated study for their potential offer real-time assistance interactivity. By improving user experience keeping attention, this technology encourages more in-depth brand involvement. The article assesses well AI-powered social media strategy optimization works. Increased conversion rates, better engagement, fine-tuned tactics results automation. Finally, takes into account growing significance optimizing campaigns voice visual searches, where improves visibility accessibility these new search methods. In show that essential developing tailored each individual, creative, responsive than ever before. Generative a game-changer efforts because combines creativity, efficiency, personalization increase client engagement.

Язык: Английский

Процитировано

0

IoMT-driven smart healthcare DOI
Arun Kumar Dey, Govind P. Gupta

Elsevier eBooks, Год журнала: 2025, Номер unknown, С. 149 - 160

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

CHPSO: An Efficient Algorithm for Task Scheduling and Optimizing Resource Utilization in the Cloud Environment DOI

Hind Mikram,

Said El Kafhali

Journal of Grid Computing, Год журнала: 2025, Номер 23(2)

Опубликована: Апрель 1, 2025

Язык: Английский

Процитировано

0

An Explainable LSTM-Based Intrusion Detection System Optimized by Firefly Algorithm for IoT Networks DOI Creative Commons
Taiwo Blessing Ogunseyi,

G Thiyagarajan

Sensors, Год журнала: 2025, Номер 25(7), С. 2288 - 2288

Опубликована: Апрель 4, 2025

As more IoT devices become connected to the Internet, attack surface for cybercrimes expands, leading significant security concerns these devices. Existing intrusion detection systems (IDSs) designed address often suffer from high rates of false positives and missed threats due presence redundant irrelevant information IDSs. Furthermore, recent IDSs that utilize artificial intelligence are presented as black boxes, offering no explanation their internal operations. In this study, we develop a solution identified challenges by presenting deep learning-based model adapts new attacks selecting only relevant inputs providing transparent operations easy understanding adoption cybersecurity personnel. Specifically, employ hybrid approach using statistical methods metaheuristic algorithm feature selection identify most features limit overall set while building an LSTM-based detection. To end, two publicly available datasets, NF-BoT-IoT-v2 IoTID20, training testing. The results demonstrate accuracy 98.42% 89.54% IoTID20 respectively. performance proposed is compared with other machine learning models existing state-of-the-art models, demonstrating superior accuracy. explain model's predictions increase trust in its outcomes, applied explainable (XAI) tools: Local Interpretable Model-agnostic Explanations (LIME) Shapley Additive (SHAP), valuable insights into behavior.

Язык: Английский

Процитировано

0

Enhancing malware detection utilizing Chi-Square distribution for optimal feature selection in machine learning black box models DOI Open Access
Akram Chhaybi, Saiida Lazaar

Journal of Dynamics and Games, Год журнала: 2025, Номер 0(0), С. 0 - 0

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Deciphering TON-IoT threats: Meta-heuristic and deep learning for attack classification DOI

Yifan Fang,

Yuhan Jia,

Guirong Bai

и другие.

Expert Systems with Applications, Год журнала: 2025, Номер unknown, С. 127414 - 127414

Опубликована: Апрель 1, 2025

Язык: Английский

Процитировано

0

Development of hybrid weighted networks of RNN and DBN for facilitating the secure information system in cyber security using meta-heuristic improvement DOI
R. Lakshman Naik, Sourabh Jain, Manjula Bairam

и другие.

Wireless Networks, Год журнала: 2025, Номер unknown

Опубликована: Апрель 26, 2025

Язык: Английский

Процитировано

0

Deep Shallow network with LSTM for detecting attacks in IoT networks and preserving privacy based on Adaptive hybrid encryption algorithm DOI
Dhruv Mahajan,

A. Jeyasekar

Expert Systems with Applications, Год журнала: 2025, Номер unknown, С. 128050 - 128050

Опубликована: Май 1, 2025

Язык: Английский

Процитировано

0