CloudIntellMal: An advanced cloud based intelligent malware detection framework to analyze android applications
P Mishra, T Jain, P Aggarwal, G Paul, BB Gupta… - Computers and …, 2024 - Elsevier
Serverless computing has become very popular in recent times which facilitates a greater
abstraction in virtualization technology. With the rapid development in serverless computing …
abstraction in virtualization technology. With the rapid development in serverless computing …
Adaptive and convex optimization-inspired workflow scheduling for cloud environment
Scheduling large-scale and resource-intensive workflows in cloud infrastructure is one of the
main challenges for cloud service providers (CSPs). Cloud infrastructure is more efficient …
main challenges for cloud service providers (CSPs). Cloud infrastructure is more efficient …
A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption
An organization can be created through the Industrial Internet of Things (IIoT), which can
transform an existing bound structure. The Industrial Internet of Things (IIoT) and its remote …
transform an existing bound structure. The Industrial Internet of Things (IIoT) and its remote …
High-Availability Encryption-Based Cloud Resource Provisioning System
Cryptosystems are getting fascination because of numerous regular likenesses between
these two-region disorder hypothesis and cryptography. In symmetric cryptosystems, the …
these two-region disorder hypothesis and cryptography. In symmetric cryptosystems, the …
Advance comprehensive analysis for Zigbee network-based IoT system security
M Kumar, V Yadav, SP Yadav - Discover Computing, 2024 - Springer
Zigbee is a wireless network technology that operates on a community-based infrastructure.
The primary objective of this system is to allow for the effective and inexpensive transmission …
The primary objective of this system is to allow for the effective and inexpensive transmission …
Hybrid deep learning based digital image watermarking using GAN-LSTM and adaptive gannet optimization techniques
SM Shedole, V Santhi - Multimedia Tools and Applications, 2024 - Springer
Nowadays, multimedia technology is progressing everyday. It is very easy to duplicate,
distribute and modify digital images with online editing software. Image security and privacy …
distribute and modify digital images with online editing software. Image security and privacy …
[HTML][HTML] Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
BB Gupta, A Gaurav, V Arya, S Bansal, RW Attar… - Cyber Security and …, 2025 - Elsevier
The rise in mobile malware risks brought on by the explosion of Android smartphones
required more efficient detection techniques. Inspired by a cascade of Long Short-Term …
required more efficient detection techniques. Inspired by a cascade of Long Short-Term …
[HTML][HTML] Optimized trustworthy visual intelligence model for industrial marble surface anomaly detection
A Gaurav, BB Gupta, RW Attar, V Arya… - Alexandria Engineering …, 2025 - Elsevier
In industrial manufacturing, to ensure the trustworthiness of visual intelligence, it is
necessary that models can be able to detect surface anomalies and maintain product …
necessary that models can be able to detect surface anomalies and maintain product …
A semantic feature enhancement-based aerial image target detection method using dense RFB-FE
X Li, J Zhang - International Journal on Semantic Web and …, 2023 - igi-global.com
Aerial image target detection is a challenging task due to the complex backgrounds, dense
target distribution, and large-scale differences often present in aerial images. Existing …
target distribution, and large-scale differences often present in aerial images. Existing …
[PDF][PDF] Analysis of the Development of Big data and AI-Based Technologies for the Cloud Computing Environment
A Mishra - Data Science Insights Magazine …, 2022 - insights2techinfo.com
In cloud computing, users have on-demand access to a pool of configurable computing
resources, such as data storage and processing power, located on a remote server. Most of …
resources, such as data storage and processing power, located on a remote server. Most of …