Neural Computing & Applications最新文献

筛选
英文 中文
An intelligent identification and classification system for malicious uniform resource locators (URLs). 一种用于恶意统一资源定位器(URL)的智能识别和分类系统。
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-04-20 DOI: 10.1007/s00521-023-08592-z
Qasem Abu Al-Haija, Mustafa Al-Fayoumi
{"title":"An intelligent identification and classification system for malicious uniform resource locators (URLs).","authors":"Qasem Abu Al-Haija,&nbsp;Mustafa Al-Fayoumi","doi":"10.1007/s00521-023-08592-z","DOIUrl":"10.1007/s00521-023-08592-z","url":null,"abstract":"<p><p>Uniform Resource Locator (URL) is a unique identifier composed of protocol and domain name used to locate and retrieve a resource on the Internet. Like any Internet service, URLs (also called websites) are vulnerable to compromise by attackers to develop Malicious URLs that can exploit/devastate the user's information and resources. Malicious URLs are usually designed with the intention of promoting cyber-attacks such as spam, phishing, malware, and defacement. These websites usually require action on the user's side and can reach users across emails, text messages, pop-ups, or devious advertisements. They have a potential impact that can reach, in some cases, to compromise the machine or network of the user, especially those arriving by email. Therefore, developing systems to detect malicious URLs is of great interest nowadays. This paper proposes a high-performance machine learning-based detection system to identify Malicious URLs. The proposed system provides two layers of detection. Firstly, we identify the URLs as either benign or malware using a binary classifier. Secondly, we classify the URL classes based on their feature into five classes: benign, spam, phishing, malware, and defacement. Specifically, we report on four ensemble learning approaches, viz. the ensemble of bagging trees (En_Bag) approach, the ensemble of k-nearest neighbor (En_kNN) approach, and the ensemble of boosted decision trees (En_Bos) approach, and the ensemble of subspace discriminator (En_Dsc) approach. The developed approaches have been evaluated on an inclusive and contemporary dataset for uniform resource locators (ISCX-URL2016). ISCX-URL2016 provides a lightweight dataset for detecting and categorizing malicious URLs according to their attack type and lexical analysis. Conventional machine learning evaluation measurements are used to evaluate the detection accuracy, precision, recall, F Score, and detection time. Our experiential assessment indicates that the ensemble of bagging trees (En_Bag) approach provides better performance rates than other ensemble methods. Alternatively, the ensemble of the k-nearest neighbor (En_kNN) approach provides the highest inference speed. We also contrast our En_Bag model with state-of-the-art solutions and show its superiority in binary classification and multi-classification with accuracy rates of 99.3% and 97.92%, respectively.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":" ","pages":"1-17"},"PeriodicalIF":6.0,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10117275/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9771495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantized ℋ∞ stabilization for delayed memristive neural networks 时滞记忆神经网络的量化h∞镇定
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-04-19 DOI: 10.1007/s00521-023-08510-3
Zhilian Yan, Dandan Zuo, Tong Guo, Jianping Zhou
{"title":"Quantized ℋ∞ stabilization for delayed memristive neural networks","authors":"Zhilian Yan, Dandan Zuo, Tong Guo, Jianping Zhou","doi":"10.1007/s00521-023-08510-3","DOIUrl":"https://doi.org/10.1007/s00521-023-08510-3","url":null,"abstract":"","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"138 1","pages":"16473-16486"},"PeriodicalIF":6.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73419898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MVDroid: an android malicious VPN detector using neural networks. MVDroid:一个使用神经网络的安卓恶意VPN检测器。
IF 4.5 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-04-03 DOI: 10.1007/s00521-023-08512-1
Saeed Seraj, Siavash Khodambashi, Michalis Pavlidis, Nikolaos Polatidis
{"title":"MVDroid: an android malicious VPN detector using neural networks.","authors":"Saeed Seraj, Siavash Khodambashi, Michalis Pavlidis, Nikolaos Polatidis","doi":"10.1007/s00521-023-08512-1","DOIUrl":"10.1007/s00521-023-08512-1","url":null,"abstract":"<p><p>The majority of Virtual Private Networks (VPNs) fail when it comes to protecting our privacy. If we are using a VPN to protect our online privacy, many of the well-known VPNs are not secure to use. When examined closely, VPNs can appear to be perfect on the surface but still be a complete privacy and security disaster. Some VPNs will steal our bandwidth, infect our computers with malware, install secret tracking libraries on our devices, steal our personal data, and leave our data exposed to third parties. Generally, Android users should be cautious when installing any VPN software on their devices. As a result, it is important to identify malicious VPNs before downloading and installing them on our Android devices. This paper provides an optimised deep learning neural network for identifying fake VPNs, and VPNs infected by malware based on the permissions of the apps, as well as a novel dataset of malicious and benign Android VPNs. Experimental results indicate that our proposed classifier identifies malicious VPNs with high accuracy, while it outperforms other standard classifiers in terms of evaluation metrics such as accuracy, precision, and recall.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":" ","pages":"1-11"},"PeriodicalIF":4.5,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10069720/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9688573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning based multipurpose medical image watermarking. 基于机器学习的多用途医学图像水印。
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-03-24 DOI: 10.1007/s00521-023-08457-5
Rishi Sinhal, Irshad Ahmad Ansari
{"title":"Machine learning based multipurpose medical image watermarking.","authors":"Rishi Sinhal,&nbsp;Irshad Ahmad Ansari","doi":"10.1007/s00521-023-08457-5","DOIUrl":"10.1007/s00521-023-08457-5","url":null,"abstract":"<p><p>Digital data security has become an exigent area of research due to a huge amount of data availability at present time. Some of the fields like medical imaging and medical data sharing over communication platforms require high security against counterfeit access, manipulation and other processing operations. It is essential because the changed/manipulated data may lead to erroneous judgment by medical experts and can negatively influence the human's heath. This work offers a blind and robust medical image watermarking framework using deep neural network to provide effective security solutions for medical images. During watermarking, the region of interest (ROI) data of the original image is preserved by employing the LZW (Lampel-Ziv-Welch) compression algorithm. Subsequently the robust watermark is inserted into the original image using IWT (integer wavelet transform) based embedding approach. Next, the SHA-256 algorithm-based hash keys are generated for ROI and RONI (region of non-interest) regions. The fragile watermark is then prepared by ROI recovery data and the hash keys. Further, the LSB replacement-based insertion mechanism is utilized to embed the fragile watermark into RONI embedding region of robust watermarked image. A deep neural network-based framework is used to perform robust watermark extraction for efficient results with less computational time. Simulation results verify that the scheme has significant imperceptibility, efficient robust watermark extraction, correct authentication and completely reversible nature for ROI recovery. The relative investigation with existing schemes confirms the dominance of the proposed work over already existing work.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":" ","pages":"1-22"},"PeriodicalIF":6.0,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10036986/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9717268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Outlier-resistant variance-constrained $mathit{H}_{infty }$ state estimation for time-varying recurrent neural networks with randomly occurring deception attacks 随机欺骗攻击时变递归神经网络的抗离群方差约束$mathit{H}_{infty }$状态估计
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-03-12 DOI: 10.1007/s00521-023-08419-x
Yan Gao, Jun Hu, Huijun Yu, Junhua Du, Chaoqing Jia
{"title":"Outlier-resistant variance-constrained $mathit{H}_{infty }$ state estimation for time-varying recurrent neural networks with randomly occurring deception attacks","authors":"Yan Gao, Jun Hu, Huijun Yu, Junhua Du, Chaoqing Jia","doi":"10.1007/s00521-023-08419-x","DOIUrl":"https://doi.org/10.1007/s00521-023-08419-x","url":null,"abstract":"","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"85 1","pages":"13261-13273"},"PeriodicalIF":6.0,"publicationDate":"2023-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76635924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of three quantum-inspired optimization algorithms for robust tuning of power system stabilizers 电力系统稳定器鲁棒调谐的三种量子优化算法的比较研究
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-03-09 DOI: 10.1007/s00521-023-08429-9
R. N. D. C. Filho
{"title":"Comparative study of three quantum-inspired optimization algorithms for robust tuning of power system stabilizers","authors":"R. N. D. C. Filho","doi":"10.1007/s00521-023-08429-9","DOIUrl":"https://doi.org/10.1007/s00521-023-08429-9","url":null,"abstract":"","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"5 1","pages":"12905-12914"},"PeriodicalIF":6.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73375534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new robust Harris Hawk optimization algorithm for large quadratic assignment problems 大型二次分配问题的一种新的鲁棒Harris Hawk优化算法
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-03-02 DOI: 10.1007/s00521-023-08387-2
Tansel Dökeroglu, Y. Özdemir
{"title":"A new robust Harris Hawk optimization algorithm for large quadratic assignment problems","authors":"Tansel Dökeroglu, Y. Özdemir","doi":"10.1007/s00521-023-08387-2","DOIUrl":"https://doi.org/10.1007/s00521-023-08387-2","url":null,"abstract":"","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"86 1","pages":"12531-12544"},"PeriodicalIF":6.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81271821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive dual niching-based differential evolution with resource reallocation for nonlinear equation systems 非线性方程系统资源再分配的自适应双生态位微分进化
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-02-10 DOI: 10.1007/s00521-023-08330-5
Shuijia Li, Wenyin Gong, Qiong Gu, Zuowen Liao
{"title":"Adaptive dual niching-based differential evolution with resource reallocation for nonlinear equation systems","authors":"Shuijia Li, Wenyin Gong, Qiong Gu, Zuowen Liao","doi":"10.1007/s00521-023-08330-5","DOIUrl":"https://doi.org/10.1007/s00521-023-08330-5","url":null,"abstract":"","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"13 1","pages":"11917-11936"},"PeriodicalIF":6.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86812651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time automated detection of older adults' hand gestures in home and clinical settings. 实时自动检测老年人的手势在家庭和临床设置。
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-01-01 DOI: 10.1007/s00521-022-08090-8
Guan Huang, Son N Tran, Quan Bai, Jane Alty
{"title":"Real-time automated detection of older adults' hand gestures in home and clinical settings.","authors":"Guan Huang,&nbsp;Son N Tran,&nbsp;Quan Bai,&nbsp;Jane Alty","doi":"10.1007/s00521-022-08090-8","DOIUrl":"https://doi.org/10.1007/s00521-022-08090-8","url":null,"abstract":"<p><p>There is an urgent need, accelerated by the COVID-19 pandemic, for methods that allow clinicians and neuroscientists to remotely evaluate hand movements. This would help detect and monitor degenerative brain disorders that are particularly prevalent in older adults. With the wide accessibility of computer cameras, a vision-based real-time hand gesture detection method would facilitate online assessments in home and clinical settings. However, motion blur is one of the most challenging problems in the fast-moving hands data collection. The objective of this study was to develop a computer vision-based method that accurately detects older adults' hand gestures using video data collected in real-life settings. We invited adults over 50 years old to complete validated hand movement tests (fast finger tapping and hand opening-closing) at home or in clinic. Data were collected without researcher supervision via a website programme using standard laptop and desktop cameras. We processed and labelled images, split the data into training, validation and testing, respectively, and then analysed how well different network structures detected hand gestures. We recruited 1,900 adults (age range 50-90 years) as part of the TAS Test project and developed UTAS7k-a new dataset of 7071 hand gesture images, split 4:1 into clear: motion-blurred images. Our new network, RGRNet, achieved 0.782 mean average precision (mAP) on clear images, outperforming the state-of-the-art network structure (YOLOV5-P6, mAP 0.776), and mAP 0.771 on blurred images. A new robust real-time automated network that detects static gestures from a single camera, RGRNet, and a new database comprising the largest range of individual hands, UTAS7k, both show strong potential for medical and research applications.</p><p><strong>Supplementary information: </strong>The online version contains supplementary material available at 10.1007/s00521-022-08090-8.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"35 11","pages":"8143-8156"},"PeriodicalIF":6.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9741488/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9212557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating deep learning predictions for COVID-19 from X-ray images using leave-one-out predictive densities. 利用留一预测密度评估x射线图像对COVID-19的深度学习预测。
IF 6 3区 计算机科学
Neural Computing & Applications Pub Date : 2023-01-01 DOI: 10.1007/s00521-023-08219-3
Sergio Hernández, Xaviera López-Córtes
{"title":"Evaluating deep learning predictions for COVID-19 from X-ray images using leave-one-out predictive densities.","authors":"Sergio Hernández,&nbsp;Xaviera López-Córtes","doi":"10.1007/s00521-023-08219-3","DOIUrl":"https://doi.org/10.1007/s00521-023-08219-3","url":null,"abstract":"<p><p>Early detection of the COVID-19 virus is an important task for controlling the spread of the pandemic. Imaging techniques such as chest X-ray are relatively inexpensive and accessible, but its interpretation requires expert knowledge to evaluate the disease severity. Several approaches for automatic COVID-19 detection using deep learning techniques have been proposed. While most approaches show high accuracy on the COVID-19 detection task, there is not enough evidence on external evaluation for this technique. Furthermore, data scarcity and sampling biases make difficult to properly evaluate model predictions. In this paper, we propose stochastic gradient Langevin dynamics (SGLD) to take into account the model uncertainty. Four different deep learning architectures are trained using SGLD and compared to their baselines using stochastic gradient descent. The model uncertainties are also evaluated according to their convergence properties and the leave-one-out predictive densities. The proposed approach is able to reduce overconfidence of the baseline estimators while also retaining predictive accuracy for the best-performing cases.</p>","PeriodicalId":49766,"journal":{"name":"Neural Computing & Applications","volume":"35 13","pages":"9819-9830"},"PeriodicalIF":6.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9900537/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9330144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信