A novel deep learning technique for medical image analysis using improved optimizer

V Agarwal, MC Lohani, AS Bist - Health Informatics Journal, 2024 - journals.sagepub.com
Application of Convolutional neural network in spectrum of Medical image analysis are
providing benchmark outputs which converges the interest of many researchers to explore it …

Blockage of phishing attacks through machine learning classification techniques and fine tuning its accuracy

K Mittal, KS Gill, R Chauhan, K Joshi… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Blocking phishing attacks using machine learning classification techniques is a promising
approach to enhancing email security. Phishing attacks can involve the use of fictitious …

Detection of phishing domain using logistic regression technique and feature extraction using bert classification model

K Mittal, KS Gill, R Chauhan, M Singh… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Phishing attacks pose a severe danger to the security of cyberspace. Phishing is a sort of
fraud in which victims and businesses are deceived into clicking on malicious URLs and …

Internet of Things (IOT) Intrusion Detection Utilizing CNN and Fine Tuning It Using Various Optimization Parameters

KS Gill, R Chauhan, S Dangi… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IOT) has experienced significant expansion in recent years, resulting
in the development of countless gadgets and systems aimed at improving everyday life. This …

Phishing Site Detection Using Logistic Regression and Fine Tuning It Using Various Optimization Parameters

M Singla, KS Gill, R Chauhan… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
Cybercriminals frequently prefer to deceive people into compromising their own security
than using exploits or complex assaults to get access to networks. No matter what …

Detection of Malware Using Machine Learning techniques on Random Forest, Decision Tree, KNeighbour, AdaBoost, SGD, ExtraTrees and GaussianNB Classifier

KS Gill, V Anand, R Gupta… - 2023 4th IEEE Global …, 2023 - ieeexplore.ieee.org
Spotting harmful software with machine learning models has become more crucial in
cybersecurity. Machine learning can be used to recognize and sort harmful software by …

Phishing URL Classification Using K-Nearest Neighbour and Logistic Regression Machine Learning Approaches

M Singla, KS Gill, R Chauhan, V Singh… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
With rising Internet use across the develo** countries, increasing network security is vital
because it minimizes the dangers of social privacy spoofing, identity or information theft, and …

From Bean to Bar: Using CNNs for Automated White and Black Chocolate Variety Classification

P Shourie, V Anand, D Upadhyay… - … on Circuit Power …, 2024 - ieeexplore.ieee.org
Within the contemporary chocolate industry, the categorization and distinction of different
chocolate varieties—especially white and dark chocolate—are essential for evaluating …

[PDF][PDF] Internet of Things (IOT) Intrusion Detection Utilizing CNN and Fine Tuning it using Various Optimization Parameters

KS Gill, R Chauhan, S Dangi, D Banerjee - researchgate.net
The Internet of Things (IOT) has experienced significant expansion in recent years, resulting
in the development of countless gadgets and systems aimed at improving everyday life. This …