Incorporating machine learning into established bioinformatics frameworks

N Auslander, AB Gussow, EV Koonin - International journal of molecular …, 2021 - mdpi.com
The exponential growth of biomedical data in recent years has urged the application of
numerous machine learning techniques to address emerging problems in biology and …

A novel molecular representation with BiGRU neural networks for learning atom

X Lin, Z Quan, ZJ Wang, H Huang… - Briefings in …, 2020 - academic.oup.com
Molecular representations play critical roles in researching drug design and properties, and
effective methods are beneficial to assisting in the calculation of molecules and solving …

Permutation equivariant graph framelets for heterophilous graph learning

J Li, R Zheng, H Feng, M Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The nature of heterophilous graphs is significantly different from that of homophilous graphs,
which causes difficulties in early graph neural network (GNN) models and suggests …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Machine learning approaches to predict the photocatalytic performance of bismuth ferrite-based materials in the removal of malachite green

ZH Jaffari, A Abbas, SM Lam, S Park, K Chon… - Journal of hazardous …, 2023 - Elsevier
This study focuses on the potential capability of numerous machine learning models, namely
CatBoost, GradientBoosting, HistGradientBoosting, ExtraTrees, XGBoost, DecisionTree …

[HTML][HTML] An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques

T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …

{ATLAS}: A sequence-based learning approach for attack investigation

A Alsaheel, Y Nan, S Ma, L Yu, G Walkup… - 30th USENIX security …, 2021 - usenix.org
Advanced Persistent Threats (APT) involve multiple attack steps over a long period, and
their investigation requires analysis of myriad logs to identify their attack steps, which are a …

Hda-ids: A hybrid dos attacks intrusion detection system for iot by using semi-supervised cl-gan

S Li, Y Cao, S Liu, Y Lai, Y Zhu, N Ahmad - Expert Systems with …, 2024 - Elsevier
In recent years, the application of the internet of things (IoT) in areas such as intelligent
transportation, smart cities, and the industrial internet has become increasingly widespread …

Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning

A Abdelkhalek, M Mashaly - The journal of Supercomputing, 2023 - Springer
Network intrusion detection systems (NIDS) are the most common tool used to detect
malicious attacks on a network. They help prevent the ever-increasing different attacks and …

[HTML][HTML] Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection

T Zoppi, A Ceccarelli, T Puccetti, A Bondavalli - Computers & Security, 2023 - Elsevier
There is an astounding growth in the adoption of machine learners (MLs) to craft intrusion
detection systems (IDSs). These IDSs model the behavior of a target system during a …