Alert button
Picture for Mst Shapna Akter

Mst Shapna Akter

Alert button

A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data

Add code
Bookmark button
Alert button
Aug 15, 2023
Mst Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea

Figure 1 for A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
Figure 2 for A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
Figure 3 for A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
Figure 4 for A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data
Viaarxiv icon

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection

Add code
Bookmark button
Alert button
Jun 01, 2023
Mst Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Rahman, Akond Rahman, Fan Wu

Figure 1 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 2 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 3 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 4 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Viaarxiv icon

Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks

Add code
Bookmark button
Alert button
Jun 01, 2023
Mst Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea

Figure 1 for Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Figure 2 for Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Figure 3 for Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Figure 4 for Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks
Viaarxiv icon

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

Add code
Bookmark button
Alert button
Jun 01, 2023
Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea

Figure 1 for Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Figure 2 for Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Figure 3 for Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Figure 4 for Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Viaarxiv icon

Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis

Add code
Bookmark button
Alert button
May 31, 2023
Mst Shapna Akter, Hossain Shahriar, Iysa Iqbal, MD Hossain, M. A. Karim, Victor Clincy, Razvan Voicu

Figure 1 for Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Figure 2 for Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Figure 3 for Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Figure 4 for Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
Viaarxiv icon

Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms

Add code
Bookmark button
Alert button
May 31, 2023
Mst Shapna Akter, Md Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea

Figure 1 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 2 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 3 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 4 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Viaarxiv icon

Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns

Add code
Bookmark button
Alert button
Mar 13, 2023
Mst Shapna Akter, Hossain Shahriar

Figure 1 for Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns
Figure 2 for Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns
Figure 3 for Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns
Viaarxiv icon

Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing

Add code
Bookmark button
Alert button
Mar 13, 2023
Mst Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya

Viaarxiv icon

Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network

Add code
Bookmark button
Alert button
Mar 13, 2023
Mst Shapna Akter, Hossain Shahriar, Sweta Sneha, Alfredo Cuzzocrea

Figure 1 for Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network
Figure 2 for Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network
Figure 3 for Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network
Figure 4 for Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network
Viaarxiv icon

Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words

Add code
Bookmark button
Alert button
Mar 13, 2023
Mst Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Nova Ahmed, Carson Leung

Figure 1 for Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words
Figure 2 for Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words
Figure 3 for Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words
Figure 4 for Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words
Viaarxiv icon