Alert button
Picture for Vinayakumar R

Vinayakumar R

Alert button

Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security

Add code
Bookmark button
Alert button
Mar 31, 2020
Simran K, Sriram S, Vinayakumar R, Soman KP

Figure 1 for Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security
Figure 2 for Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security
Viaarxiv icon

Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream

Add code
Bookmark button
Alert button
Mar 31, 2020
Simran K, Prathiksha Balakrishna, Vinayakumar R, Soman KP

Figure 1 for Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
Figure 2 for Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
Figure 3 for Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
Figure 4 for Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
Viaarxiv icon

Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis

Add code
Bookmark button
Alert button
Mar 31, 2020
Simran K, Prathiksha Balakrishna, Vinayakumar R, Soman KP

Figure 1 for Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis
Figure 2 for Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis
Figure 3 for Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis
Figure 4 for Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis
Viaarxiv icon

Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network

Add code
Bookmark button
Alert button
Oct 01, 2019
Shisrut Rawat, Aishwarya Srinivasan, Vinayakumar R

Figure 1 for Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network
Figure 2 for Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network
Figure 3 for Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network
Figure 4 for Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network
Viaarxiv icon

Emotion Detection using Data Driven Models

Add code
Bookmark button
Alert button
Jan 10, 2019
Naveenkumar K S, Vinayakumar R, Soman KP

Figure 1 for Emotion Detection using Data Driven Models
Figure 2 for Emotion Detection using Data Driven Models
Figure 3 for Emotion Detection using Data Driven Models
Figure 4 for Emotion Detection using Data Driven Models
Viaarxiv icon

RNNSecureNet: Recurrent neural networks for Cyber security use-cases

Add code
Bookmark button
Alert button
Jan 05, 2019
Mohammed Harun Babu R, Vinayakumar R, Soman KP

Figure 1 for RNNSecureNet: Recurrent neural networks for Cyber security use-cases
Figure 2 for RNNSecureNet: Recurrent neural networks for Cyber security use-cases
Figure 3 for RNNSecureNet: Recurrent neural networks for Cyber security use-cases
Figure 4 for RNNSecureNet: Recurrent neural networks for Cyber security use-cases
Viaarxiv icon

A Deep Learning Approach for Similar Languages, Varieties and Dialects

Add code
Bookmark button
Alert button
Jan 02, 2019
Vidya Prasad K, Akarsh S, Vinayakumar R, Soman KP

Figure 1 for A Deep Learning Approach for Similar Languages, Varieties and Dialects
Figure 2 for A Deep Learning Approach for Similar Languages, Varieties and Dialects
Figure 3 for A Deep Learning Approach for Similar Languages, Varieties and Dialects
Figure 4 for A Deep Learning Approach for Similar Languages, Varieties and Dialects
Viaarxiv icon

A short review on Applications of Deep learning for Cyber security

Add code
Bookmark button
Alert button
Dec 15, 2018
Mohammed Harun Babu R, Vinayakumar R, Soman KP

Viaarxiv icon

Deep-Net: Deep Neural Network for Cyber Security Use Cases

Add code
Bookmark button
Alert button
Dec 09, 2018
Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman KP

Figure 1 for Deep-Net: Deep Neural Network for Cyber Security Use Cases
Figure 2 for Deep-Net: Deep Neural Network for Cyber Security Use Cases
Figure 3 for Deep-Net: Deep Neural Network for Cyber Security Use Cases
Figure 4 for Deep-Net: Deep Neural Network for Cyber Security Use Cases
Viaarxiv icon

DeepImageSpam: Deep Learning based Image Spam Detection

Add code
Bookmark button
Alert button
Oct 03, 2018
Amara Dinesh Kumar, Vinayakumar R, Soman KP

Figure 1 for DeepImageSpam: Deep Learning based Image Spam Detection
Figure 2 for DeepImageSpam: Deep Learning based Image Spam Detection
Figure 3 for DeepImageSpam: Deep Learning based Image Spam Detection
Figure 4 for DeepImageSpam: Deep Learning based Image Spam Detection
Viaarxiv icon