CloudIntellMal: An advanced cloud based intelligent malware detection framework to analyze android applications

P Mishra, T Jain, P Aggarwal, G Paul, BB Gupta… - Computers and …, 2024 - Elsevier
Serverless computing has become very popular in recent times which facilitates a greater
abstraction in virtualization technology. With the rapid development in serverless computing …

Adaptive and convex optimization-inspired workflow scheduling for cloud environment

K Lakhwani, G Sharma, R Sandhu… - International Journal of …, 2023 - igi-global.com
Scheduling large-scale and resource-intensive workflows in cloud infrastructure is one of the
main challenges for cloud service providers (CSPs). Cloud infrastructure is more efficient …

A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption

CT Dora Pravina, MU Buradkar, MK Jamal… - Proceedings of the 4th …, 2022 - dl.acm.org
An organization can be created through the Industrial Internet of Things (IIoT), which can
transform an existing bound structure. The Industrial Internet of Things (IIoT) and its remote …

High-Availability Encryption-Based Cloud Resource Provisioning System

RS Koppaiyan, AS Pallivalappil, P Singh… - Proceedings of the 4th …, 2022 - dl.acm.org
Cryptosystems are getting fascination because of numerous regular likenesses between
these two-region disorder hypothesis and cryptography. In symmetric cryptosystems, the …

Advance comprehensive analysis for Zigbee network-based IoT system security

M Kumar, V Yadav, SP Yadav - Discover Computing, 2024 - Springer
Zigbee is a wireless network technology that operates on a community-based infrastructure.
The primary objective of this system is to allow for the effective and inexpensive transmission …

Hybrid deep learning based digital image watermarking using GAN-LSTM and adaptive gannet optimization techniques

SM Shedole, V Santhi - Multimedia Tools and Applications, 2024 - Springer
Nowadays, multimedia technology is progressing everyday. It is very easy to duplicate,
distribute and modify digital images with online editing software. Image security and privacy …

[HTML][HTML] Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection

BB Gupta, A Gaurav, V Arya, S Bansal, RW Attar… - Cyber Security and …, 2025 - Elsevier
The rise in mobile malware risks brought on by the explosion of Android smartphones
required more efficient detection techniques. Inspired by a cascade of Long Short-Term …

[HTML][HTML] Optimized trustworthy visual intelligence model for industrial marble surface anomaly detection

A Gaurav, BB Gupta, RW Attar, V Arya… - Alexandria Engineering …, 2025 - Elsevier
In industrial manufacturing, to ensure the trustworthiness of visual intelligence, it is
necessary that models can be able to detect surface anomalies and maintain product …

A semantic feature enhancement-based aerial image target detection method using dense RFB-FE

X Li, J Zhang - International Journal on Semantic Web and …, 2023 - igi-global.com
Aerial image target detection is a challenging task due to the complex backgrounds, dense
target distribution, and large-scale differences often present in aerial images. Existing …

[PDF][PDF] Analysis of the Development of Big data and AI-Based Technologies for the Cloud Computing Environment

A Mishra - Data Science Insights Magazine …, 2022 - insights2techinfo.com
In cloud computing, users have on-demand access to a pool of configurable computing
resources, such as data storage and processing power, located on a remote server. Most of …