Open Access
Issue
E3S Web Conf.
Volume 491, 2024
International Conference on Environmental Development Using Computer Science (ICECS’24)
Article Number 02024
Number of page(s) 13
Section Smart Systems for Environmental Development
DOI https://doi.org/10.1051/e3sconf/202449102024
Published online 21 February 2024
  1. S. Sharma, A. K. M. M. Alam and K. Chen, “Image Disguising for Protecting Data and Model Confidentiality in Outsourced Deep Learning,” 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA, 2021, pp. 71–77, doi: 10.1109/CLOUD53861.2021.00020. [Google Scholar]
  2. L. Fan, “Image pixelization with differential privacy”, Data and Applications Security and Privacy XXXII – 32nd Annual IFIP WG 11.3 Conference DBSec 2018, pp. 148–162, July 16–18, 2018. [Google Scholar]
  3. M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page and T. Ristenpart, “Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing”, 23rd USENIX Security Symposium USENIX Security, vol. 14, pp. 17–32, 2014. [Google Scholar]
  4. J. Gallier, Geometric Methods and Applications for Computer Science and Engineering, New York:Springer-Verlag, 2000. [Google Scholar]
  5. R. Talbi, “Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale,” 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), Valencia, Spain, 2020, pp. 69–70, doi: 10.1109/DSN-S50200.2020.00037. [Google Scholar]
  6. N. B. Henda, A. Msolli, I. Hagui, A. Helali, H. Maaref and R. Mghaieth, “A Novel SVM Based CFS for Intrusion Detection in IoT Network,” 2023 IEEE International Conference on Advanced Systems and Emergent Technologies (IC_ASET), Hammamet, Tunisia, 2023, pp. 1–5, doi: 10.1109/IC_ASET58101.2023.10150979. [Google Scholar]
  7. AnsamKhraisat, IqbalGondal, Peter Vamplew and Joarder Kamruzzaman, “Survey of intrusion detection systems: techniques datasets and challenges”, Cybersecurity, vol. 2, no. 1, pp. 20, 2019. [CrossRef] [Google Scholar]
  8. MahbodTavallaee, EbrahimBagheri, Wei Lu and Ali A Ghorbani, “A detailed analysis of the kdd cup 99 data set”, 2009 IEEE symposium on computational intelligence for security and defense applications, pp. 1–6, 2009. [Google Scholar]
  9. Birnur Uzun and Serkan Balli, “Performance evaluation of machine learning algorithms for detecting abnormal data traffic in computer networks”, 2020 5th International Conference on Computer Science and Engineering (UBMK), pp. 165–170, 2020. [Google Scholar]
  10. Tohari Ahmad and Mohammad Nasrul Aziz, “Data preprocessing and feature selection for machine learning intrusion detection systems”, ICIC Express Lett, vol. 13, no. 2, pp. 93–101, 2019. [Google Scholar]
  11. S. Ajani and M. Wanjari, “An Efficient Approach for Clustering Uncertain Data Mining Based on Hash Indexing and Voronoi Clustering,” 2013 5th International Conference and Computational Intelligence and Communication Networks, 2013, pp. 486–490, doi: 10.1109/CICN.2013.106. [Google Scholar]
  12. Khetani, V.. , Gandhi, Y.. , Bhattacharya, S.. , Ajani, S. N. ., &Limkar, S.. (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262. [Google Scholar]
  13. A. Yadav and A. Kaur, “BIFT: A federated learning System for Connected and Autonomous Vehicles Based on Blockchain,” 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 2023, pp. 1724–1727, doi: 10.1109/ICACITE57410.2023.10182869. [Google Scholar]
  14. M. Poongodi, S. Bourouis, A. N. Ahmed, M. Vijayaragavan, K. G. S. Venkatesan, W. Alhakami, et al., “A novel secured multi-access edge computing based vanet with neuro fuzzy systems based blockchain framework”, Computer Communications, vol. 192, pp. 48–56, 2022. [CrossRef] [Google Scholar]
  15. Ying He, Ke Huang, Guangzheng Zhang, F. Richard Yu, Jianyong Chen and Jianqiang Li, “Bift: A Blockchain-Based Federated Learning System for Connected and Autonomous Vehicles”, IEEE INTERNET OF THINGS JOURNAL, vol. 9, no. 14, JULY 2022. [Google Scholar]
  16. H. Yao, C. Liu, P. Zhang, S. Wu, C. Jiang and S. Yu, “Identification of encrypted traffic through attention mechanism based long short term memory”, IEEE Trans. Big Data, Sep. 2019. [Google Scholar]
  17. Y. Liu, F. R. Yu, X. Li, H. Ji and V. C. M. Leung, “Blockchain and machine learning for communications and networking systems”, IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 1392–1431, 2nd Quart. 2020. [CrossRef] [Google Scholar]
  18. V. P. Sriram et al., “A Critical Analysis of Machine Learning’s Function in Changing the Social and Business Ecosystem”, Proceedings of Second International Conference in Mechanical and Energy Technology, 2023. [Google Scholar]
  19. Y. He et al., “Deep-reinforcement-learning-based optimization for cache- enabled opportunistic interference alignment wireless networks”, IEEE Trans. Veh. Technol., vol. 66, no. 11, pp. 10433–10445, Nov. 2017. [CrossRef] [Google Scholar]
  20. Bhattacharya, S.. , &Pandey, M.. (2023). An Integrated Decision-Support System for Increasing Crop Yield Based on Progressive Machine Learning and Sensor Data. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 272–284. [Google Scholar]
  21. H. L. Ngoc, T. Cong Hung, N. D. Huy and N. ThiThanh Hang, “Early Phase Warning Solution About System Security Based on Log Analysis,” 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam, 2019, pp. 398–403, doi: 10.1109/NICS48868.2019.9023899. [Google Scholar]
  22. R. Patil Rashmi, Y. Gandhi, V. Sarmalkar, P. Pund and V. Khetani, “RDPC: Secure Cloud Storage with Deduplication Technique,” 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2020, pp. 1280–1283, doi: 10.1109/I-SMAC49090.2020.9243442. [Google Scholar]
  23. Sin Chun Ng and Majid Bakhtiarib, “Advanced Persistent Threat Detection Based On Network Traffic Noise Pattern and Analysis”, Journal of Advanced Research in Computing and Applications, vol. 2, no. 1, pp. 2462–2462, 2016. [Google Scholar]
  24. S. Sadhwani, A. Verma, R. Muthalagu and P. M. Pawar, “Network Intrusion Detection: A Study on Various Learning Approaches,” 2023 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emirates, 2023, pp. 161–166, doi: 10.1109/ICCIKE58312.2023.10131701. [Google Scholar]
  25. P. Tahiri, S. Sonia, P. Jain, G. Gupta, W. Salehi and S. Tajjour, “An Estimation of Machine Learning Approaches for Intrusion Detection System,” 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 2021, pp. 343–348, doi: 10.1109/ICACITE51222.2021.9404643. [Google Scholar]
  26. Z. Li, J. Wu, S. Mumtaz, A. -E. M. Taha, S. Al-Rubaye and A. Tsourdos, “Machine Learning and Multi-dimension Features based Adaptive Intrusion Detection in ICN,” ICC 2020 – 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 2020, pp. 1–5, doi: 10.1109/ICC40277.2020.9149250. [Google Scholar]
  27. M. Abaoud, M. A. Almuqrin and M. F. Khan, “Advancing Federated Learning Through Novel Mechanism for Privacy Preservation in Healthcare Applications,” in IEEE Access, vol. 11, pp. 83562–83579, 2023, doi: 10.1109/ACCESS.2023.3301162. [CrossRef] [Google Scholar]
  28. Dhabliya, M. D. . (2021). Cloud Computing Security Optimization via Algorithm Implementation. International Journal of New Practices in Management and Engineering, 10(01), 22–24. [CrossRef] [Google Scholar]
  29. Dhabliya, D. (2021). An Integrated Optimization Model for Plant Diseases Prediction with Machine Learning Model . Machine Learning Applications in [Google Scholar]
  30. Engineering Education and Management, 1(2), 21–26. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/15 [Google Scholar]
  31. Sairise, Raju M., Limkar, Suresh, Deokate, Sarika T., Shirkande, Shrinivas T., Mahajan, RupaliAtul& Kumar, Anil (2023) Secure group key agreement protocol with elliptic curve secret sharing for authentication in distributed environments, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1569-1583, DOI: 10.47974/JDMSC-1825 [CrossRef] [Google Scholar]
  32. Rahul Sharma. (2018). Monitoring of Drainage System in Urban Using Device Free Localization Neural Networks and Cloud computing. International Journal of New Practices in Management and Engineering, 7(04), 08 –14. https://doi.org/10.17762/ijnpme.v7i04.69 [Google Scholar]
  33. Dhabliya, D. (2021). Feature Selection Intrusion Detection System for The Attack Classification with Data Summarization. Machine Learning Applications in Engineering Education and Management, 1(1), 20-25. [Google Scholar]
  34. Dhabliya, P. D. . (2020). Multispectral Image Analysis Using Feature Extraction with Classification for Agricultural Crop Cultivation Based On 4 G Wireless IOT Networks. Research Journal of Computer Systems and Engineering, 1(1), 01-05. [Google Scholar]
  35. Kumar, A., & Sharma, S. K. (2022). Information cryptography using cellular automata and digital image processing. Journal of Discrete Mathematical Sciences and Cryptography, 25(4), 1105-1111. [CrossRef] [Google Scholar]
  36. Sable, N. P., Shende, P., Wankhede, V. A., Wagh, K. S., Ramesh, J. V. N., & Chaudhary, S. (2023). DQSCTC: design of an efficient deep dyna-Q network for spinal cord tumour classification to identify cervical diseases. Soft Computing, 126. [Google Scholar]
  37. Thota, D. S. ., Sangeetha, D. M., & Raj, R. . (2022). Breast Cancer Detection by Feature Extraction and Classification Using Deep Learning Architectures. Research Journal of Computer Systems and Engineering, 3(1), 90-94. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/48 [Google Scholar]
  38. Ritika Dhabliya. (2020). Obstacle Detection and Text Recognition for Visually Impaired Person Based on Raspberry Pi. International Journal of New Practices in Management and Engineering, 9(02), 01 –07. https://doi.org/10.17762/ijnpme.v9i02.83 [CrossRef] [Google Scholar]
  39. Ahammad, D. S. K. H. (2022). Microarray Cancer Classification with Stacked Classifier in Machine Learning Integrated Grid L1-Regulated Feature Selection. Machine Learning Applications in Engineering Education and Management, 2(1), 01-10. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.