Article
Computer Science, Artificial Intelligence
Ashok Sutagundar, Prashant Sangulagi
Summary: Sensor Cloud is a technology that increases the lifetime of sensor networks by storing sensed information in cloud servers, instead of node memory. However, challenges like latency and accuracy remain. Fog computing acts as a solution to reduce latency and improve computational speed in Sensor Cloud systems.
EXPERT SYSTEMS WITH APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Arif Ullah, Aziza Chakir
Summary: This paper presents an approach to improve the task distribution system in virtual machines for cloud computing using load balancing technique. By modifying the fitness function and search process of the bat algorithm, the proposed modified bat algorithm provides efficient results, improving the accuracy and efficiency of cloud data centers.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Mamdouh Alenezi
Summary: Cloud computing is widely used in organizations of all sizes for its rapid deployment and cost-effectiveness, but it also poses new challenges in terms of security. Cloud security aims to protect cloud infrastructure systems, ensuring data security and regulatory compliance.
COMPUTER SYSTEMS SCIENCE AND ENGINEERING
(2021)
Article
Computer Science, Artificial Intelligence
Xiaodong Wu, Zhigang Jin, Junyi Zhou, Chenxu Duan
Summary: In this paper, a quantum walks-based classification model for intrusion detection in cloud computing is proposed. The model utilizes Principal Component Analysis to concentrate feature information and a training-free clustering algorithm for data aggregation via quantum walks. Additionally, a new cloud architecture with added security layer in SDN is proposed to enhance the model's usability in cloud computing security. Experimental results demonstrate the model's effectiveness in dealing with attacks on SDN-based cloud computing and its stable and excellent attack identification ability under different traffic intensities.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Ji Liu, Xiao Liang, Wenxi Ruan, Bo Zhang
Summary: The aim of the research is to improve the efficiency of medical data processing and establish a sound medical data management system using technologies such as the PRF algorithm, ADDPC method, and BPT-CNN model. The results show that these technologies applied on a distributed computing platform can effectively enhance algorithm performance, optimize data communication cost and efficiency, and adapt to different types of data sets to prevent data loss and fragmentation.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Information Systems
Ali Aghasi, Kamal Jamshidi, Ali Bohlooli
Summary: The rapid growth of cloud computing applications has led to increased power consumption and heat generation in data centers. This study proposes a metaheuristic approach based on the binary version of gravitational search algorithm and fuzzy logic to simultaneously reduce computational and cooling energy consumption, as well as provide more reliable operation.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Review
Computer Science, Information Systems
Mohamad Mulham Belal, Divya Meena Sundaram
Summary: This paper presents a literature review on the use of machine learning and deep learning algorithms as security techniques in cloud computing. It discusses different types of attacks and threats, the limitations of traditional security techniques, and the development of defenses based on machine learning and deep learning. The analysis of case studies provides insights into common security issues and countermeasures in cloud environments, and the paper also discusses future research directions and challenges in cloud computing security.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Engineering, Mechanical
Ming-Wei Li, Yu-Tain Wang, Jing Geng, Wei-Chiang Hong
Summary: The paper proposes a hybrid optimization algorithm, the Chaotic Cloud Quantum Bats Algorithm (CCQBA), which improves performance by enhancing evolution mechanism, local search mechanism, mutation mechanism, and other aspects. Compared to alternative algorithms, CCQBA demonstrates significantly better convergence accuracy and speed, making it a superior method for solving complex problems.
NONLINEAR DYNAMICS
(2021)
Article
Computer Science, Information Systems
Adnan Alrabea
Summary: Cloud computing is rapidly growing as an alternative to conventional IT outsourcing. This paper proposes a modified Boneh-Lynn-Shachame dynamic auditing algorithm for the public audit process in cloud data storage, aiming to protect privacy.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Hardware & Architecture
Yang Yang, Songtao Guo, Guiyan Liu, Lin Yi
Summary: This paper proposes two fine granularity models and multiple efficient embedding algorithms to solve the virtual data center embedding problem. Comparing with existing methods, our algorithms can find sub-optimal solutions in polynomial time and outperform existing methods in terms of acceptance ratio, revenue, and utilization.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Artificial Intelligence
Prerna Sharma, Kapil Sharma
Summary: This article proposes a systematic solution for classifying leukocytes in blood smears, combining the advantages of nature-inspired and quantum-inspired algorithms, with the quantum-inspired binary bat algorithm showing significant effectiveness in feature selection. The research findings demonstrate that QBBA outperforms traditional algorithms in the same population, achieving an average accuracy of 98.31% and enhanced noise resistance capabilities.
Article
Computer Science, Artificial Intelligence
Murugan Hemalatha
Summary: COVID-19 is a global pandemic that requires efficient diagnosis and isolation for protection. This paper proposes a hybrid deep learning classifier optimized using Modified Heat Transfer Search (MOMHTS) for resource-constrained edge devices. Extensive experiments on real-time datasets demonstrate its effectiveness in detecting COVID-19 and pneumonia with high accuracy.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Environmental Sciences
Liming Dong, Wenzhi Zeng, Lifeng Wu, Guoqing Lei, Haorui Chen, Amit Kumar Srivastava, Thomas Gaiser
Summary: The study evaluated the potential of a hybrid machine learning model for estimating daily pan evaporation in arid and semi-arid regions of northwest China. The new developed Bat-CB model outperformed other commonly used algorithms and showed significant improvements in seasonal and spatial performance. Overall, Bat-CB demonstrated high accuracy, robust stability, and great potential for pan evaporation estimation in the studied regions.
Article
Chemistry, Analytical
Amit Kumar Balyan, Sachin Ahuja, Umesh Kumar Lilhore, Sanjeev Kumar Sharma, Poongodi Manoharan, Abeer D. Algarni, Hela Elmannai, Kaamran Raahemifar
Summary: Due to the rapid growth in IT technology, digital data availability has increased, creating new security threats that require immediate attention. An intrusion detection system (IDS) is a promising solution for preventing malicious intrusions and tracking suspicious network behavior. This research proposes an efficient hybrid network-based IDS model (HNIDS) that addresses the issue of data imbalance and achieves superior performance compared to other machine learning methods.
Review
Computer Science, Information Systems
Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, Muhammad Ayaz
Summary: Cloud computing has become a widely studied area in academia and industry, with security threats like data tampering and leakage being major concerns. This systematic literature review identified blockchain as a potential technology to address security challenges in cloud computing.
Article
Computer Science, Hardware & Architecture
Rajendra Patil, Chirag Modi
JOURNAL OF SUPERCOMPUTING
(2019)
Article
Computer Science, Information Systems
Rajendra Patil, Harsha Dudeja, Chirag Modi
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2020)
Article
Astronomy & Astrophysics
Chirag Modi, Emanuele Castorina, Yu Feng, Martin White
JOURNAL OF COSMOLOGY AND ASTROPARTICLE PHYSICS
(2019)
Article
Astronomy & Astrophysics
Chirag Modi, Martin White, Anze Slosar, Emanuele Castorina
JOURNAL OF COSMOLOGY AND ASTROPARTICLE PHYSICS
(2019)
Article
Astronomy & Astrophysics
Chirag Modi, Shi-Fan Chen, Martin White
MONTHLY NOTICES OF THE ROYAL ASTRONOMICAL SOCIETY
(2020)
Article
Green & Sustainable Science & Technology
Madhu Gopahanal Manjunath, Chintamani Vyjayanthi, Chirag N. Modi
Summary: This paper introduces an adaptive step size based drift-free perturb and observe algorithm with power optimiser and load protection for maximum power extraction from photovoltaic panels in stand-alone applications. The algorithm adjusts the perturbation step size by continuously monitoring the absolute value of power change for fast tracking of maximum power point, reducing power loss, and providing load protection.
IET RENEWABLE POWER GENERATION
(2021)
Article
Computer Science, Hardware & Architecture
Ajit Muzumdar, Chirag Modi, G. M. Madhu, C. Vyjayanthi
Summary: This paper proposes a trustworthy and incentivized framework for smart grid energy trading using distributed ledger technology and smart contracts to address challenges in energy trading, such as transparency, data verification, privacy, and incentivization.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Ajit Muzumdar, Chirag Modi, C. Vyjayanthi
Summary: This research introduces a blockchain-enabled energy theft detection system that accurately detects energy theft and preserves consumer privacy in smart grid neighbourhood area networks.
ELECTRIC POWER SYSTEMS RESEARCH
(2022)
Article
Green & Sustainable Science & Technology
Ajit Muzumdar, Chirag Modi, C. Vyjayanthi
Summary: This paper proposes a trustworthy and incentivized emission trading system based on hyperledger and smart contracts to address the existing issues in emission trading systems. It introduces a priority based auction strategy to incentivize participants and achieve reliable and secure energy trading.
JOURNAL OF CLEANER PRODUCTION
(2022)
Article
Engineering, Electrical & Electronic
Madhu Gopahanal Manjunath, Vyjayanthi Chintamani, Chirag Modi
Summary: This paper presents a novel real-time hybrid battery state of charge (SoC) and state of health (SoH) estimation technique for optimal operation in renewable energy integrated microgrid applications. The proposed technique accurately estimates the SoC and dynamically recalibrates it during idle conditions. It also estimates the SoH using a modified coulomb counting method and variation of battery capacity at different charge-discharge rates.
INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS
(2023)
Article
Computer Science, Information Systems
Ajit A. Muzumdar, Chirag N. Modi, G. M. Madhu, Chintamani Vyjayanthi
Summary: The study proposes a model using technologies such as random forest, support vector regressor, and long short term memory for consumer's short term load forecasting. Experimental results show significant error reduction and adaptability to highly volatile and uncertain load patterns.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
G. M. Madhu, C. Vyjayanthi, Chirag N. Modi
Summary: This study analyzed the performance of a PV array under different shading and irradiance conditions through simulation studies and experimental verification. The research found that irradiance has a significant impact on the performance of the PV array, and needs to be considered as a design variable.
Proceedings Paper
Automation & Control Systems
Ajit Muzumdar, Chirag Modi, C. Vyjayanthi
IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY
(2020)
Proceedings Paper
Computer Science, Hardware & Architecture
P. Swathi, Chirag Modi, Dhiren Patel
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT)
(2019)
Article
Computer Science, Information Systems
Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina
Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan
Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu
Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang
Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso
Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Wenjie Wang, Yuanhai Shao, Yiju Wang
Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Snofy D. Dunston, V. Mary Anita Rajam
Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao
Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras
Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Benyuan Yang, Lili Luo, Zhimeng Wang
Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun
Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Hongsong Chen, Xingyu Li, Wenmao Liu
Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Roberto Doriguzzi-Corin, Domenico Siracusa
Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Antonio Giovanni Schiavone
Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.
COMPUTERS & SECURITY
(2024)
Article
Computer Science, Information Systems
Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis
Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.
COMPUTERS & SECURITY
(2024)