• Publications
  • Influence
Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack
TLDR
A machine learning based Distributed Denial of Service (DDoS) attack detection system, implemented in a virtual SDN environment testbed, has been presented in this paper. Expand
  • 10
  • 1
Study of Different Deep Learning Approach with Explainable AI for Screening Patients with COVID-19 Symptoms: Using CT Scan and Chest X-ray Image Dataset
TLDR
We develop a deep learning-based model that can detect COVID-19 patients with better accuracy both on CT scan and chest X-ray image dataset. Expand
  • 4
  • 1
  • PDF
Extending the Storage Capacity And Noise Reduction of a Faster QR-Code
TLDR
We proposed a faster QR code which has more storage and can scan faster. Expand
  • 4
  • 1
A survey of blockchain from security perspective
TLDR
The report starts with an overview of the blockchain security system and then highlights the specific security threats and summarizes them. Expand
  • 27
CIDMP: Completely Interpretable Detection of Malaria Parasite in Red Blood Cells using Lower-dimensional Feature Space
TLDR
We present CIDMP, a system that uses reduced feature space to predict malaria-infected RBC with high prediction accuracy even with a significantly reduced feature-space. Expand
  • 5
  • PDF
Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents
TLDR
Online media is now a significant carrier for quicker and ubiquitous diffusion of information. Expand
  • 5
Detect Review Manipulation by Leveraging Reviewer Historical Stylometrics in Amazon, Yelp, Facebook and Google Reviews
TLDR
We try to mimic how a specialist will look to detect review manipulation and came up with algorithms that are compatible with significant and well known online services. Expand
  • 5
A Genetic Algorithm Approach to Regenerate Image from a Reduce Scaled Image Using Bit Data Count
TLDR
A genetic algorithm approach to recover lost bits while image resized to the smaller version using the original image data bit counts which are stored while the image is scaled. Expand
  • 5
A Robust Approach of Facial Orientation Recognition from Facial Features
TLDR
In this paper, we propose an image mapping technique for face analysis in smart camera networks with a feature extraction and data from the facial feature. Expand
  • 3
Shamir's Secret Sharing for Authentication without Reconstructing Password
TLDR
Shamir's Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharing. Expand
  • 3
...
1
2
3
...