Picture for Mst Shapna Akter

Mst Shapna Akter

A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data

Add code
Aug 15, 2023
Figure 1 for A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
Figure 2 for A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
Figure 3 for A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
Figure 4 for A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
Viaarxiv icon

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection

Add code
Jun 01, 2023
Figure 1 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 2 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 3 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 4 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Viaarxiv icon

Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks

Add code
Jun 01, 2023
Figure 1 for Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Figure 2 for Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Figure 3 for Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Figure 4 for Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Viaarxiv icon

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

Add code
Jun 01, 2023
Figure 1 for Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Figure 2 for Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Figure 3 for Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Figure 4 for Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Viaarxiv icon

Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis

Add code
May 31, 2023
Figure 1 for Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Figure 2 for Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Figure 3 for Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Figure 4 for Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Viaarxiv icon

Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms

Add code
May 31, 2023
Figure 1 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 2 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 3 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 4 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Viaarxiv icon

Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words

Add code
Mar 13, 2023
Figure 1 for Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words
Figure 2 for Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words
Figure 3 for Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words
Figure 4 for Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words
Viaarxiv icon

Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns

Add code
Mar 13, 2023
Figure 1 for Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns
Figure 2 for Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns
Figure 3 for Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns
Viaarxiv icon

Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing

Add code
Mar 13, 2023
Viaarxiv icon

Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data

Add code
Mar 13, 2023
Figure 1 for Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data
Figure 2 for Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data
Figure 3 for Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data
Figure 4 for Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data
Viaarxiv icon