DARWIN: Survival of the Fittest Fuzzing Mutators

P Jauernig, D Jakobovic, S Picek, E Stapf… - arXiv preprint arXiv …, 2022 - arxiv.org
Fuzzing is an automated software testing technique broadly adopted by the industry. A
popular variant is mutation-based fuzzing, which discovers a large number of bugs in …

Genetic algorithm based image reconstruction applying the digital holography process with the Discrete Orthonormal Stockwell Transform technique for diagnosis of …

GU Kaya, TÖ Onur - Computers in Biology and Medicine, 2022 - Elsevier
Abstract World Health Organization has described the real-time reverse transcription-
polymerase chain reaction test method for the diagnosis of the novel coronavirus disease …

An Energy-Efficient Multi-swarm Optimization in Wireless Sensor Networks.

R Alkanhel, K Chinnathambi… - … Automation & Soft …, 2023 - search.ebscohost.com
Abstract Wireless Sensor Networks are a group of sensors with inadequate power sources
that are installed in a particular region to gather information from the surroundings …

[PDF][PDF] Breast Cancer Detection Using Breastnet-18 Augmentation with Fine-Tuned VGG-16

S Kumar, P Parthasarathi, MA Hogo… - … Automation and Soft …, 2023 - cdn.techscience.cn
Breast cancer became one of the major causes of death in women around the world. It is
becoming increasingly common across both industrialized and developing economies. This …

[PDF][PDF] Crypto Hash Based Malware Detection in IoMT Framework.

R Punithavathi, K Venkatachalam… - … Automation & Soft …, 2022 - cdn.techscience.cn
The challenges in providing e-health services with the help of Internet of Medical Things
(IoMT) is done by connecting to the smart medical devices. Through IoMT sensor …

[PDF][PDF] Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data.

AJ Basha, N Rajkumar, MA AlZain… - … Automation & Soft …, 2022 - researchgate.net
In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication
processes between the medical devices and the humans via wireless network. Moreover …

[PDF][PDF] Deep Fake Detection Using Computer Vision-Based Deep Neural Network with Pairwise Learning.

R Saravana Ram, M Vinoth Kumar… - … Automation & Soft …, 2023 - cdn.techscience.cn
Deep learning-based approaches are applied successfully in many fields such as deepFake
identification, big data analysis, voice recognition, and image recognition. Deepfake is the …

[PDF][PDF] Butterfly Optimized Feature Selection with Fuzzy C-Means Classifier for Thyroid Prediction.

SJK Kumar, P Parthasarathi, M Masud… - … Automation & Soft …, 2023 - cdn.techscience.cn
The main task of thyroid hormones is controlling the metabolism rate of humans, the
development of neurons, and the significant growth of reproductive activities. In medical …

[PDF][PDF] Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security.

AH Alharbi, S Karthick, K Venkatachalam… - … Automation & Soft …, 2023 - researchgate.net
Recent security applications in mobile technologies and computer systems use face
recognition for high-end security. Despite numerous security techniques, face recognition is …

[PDF][PDF] Healthcare Monitoring Using Ensemble Classifiers in Fog Computing Framework.

PM Arunkumar, M Masud, S Aljahdali… - … Systems Science & …, 2023 - cdn.techscience.cn
Nowadays, the cloud environment faces numerous issues like synchronizing information
before the switch over the data migration. The requirement for a centralized internet of things …