no code implementations • 26 Nov 2022 • Sandhya Aneja, Nagender Aneja, Ponnurangam Kumaraguru
Media news are making a large part of public opinion and, therefore, must not be fake.
no code implementations • 25 Jun 2022 • Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim
Despite substantial advances in network architecture performance, the susceptibility of adversarial attacks makes deep learning challenging to implement in safety-critical applications.
no code implementations • 31 Dec 2021 • Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim
Transfer learning allows us to exploit knowledge gained from one task to assist in solving another but relevant task.
no code implementations • 22 Dec 2021 • Sandhya Aneja, Melanie Ang Xuan En, Nagender Aneja
Our results show that the predicting performance of the AdLIoTLog model trained by our method degrades by 3-4% in the presence of attack in comparison to the scenario when the network is not under attack.
no code implementations • 10 Sep 2020 • Rajarshi Roy Chowdhury, Sandhya Aneja, Nagender Aneja, Emeroylariffion Abas
DFP identifies a device by using implicit identifiers, such as network traffic (or packets), radio signal, which a device used for its communication over the network.
no code implementations • 20 Jul 2020 • Sandhya Aneja, Siti Nur Afikah Bte Abdul Mazid, Nagender Aneja
The low BLEU score of Google Translation in comparison to our model indicates that the application based regional models are better.
no code implementations • 19 Sep 2019 • Nagender Aneja, Sandhya Aneja
This paper presents an analysis of pre-trained models to recognize handwritten Devanagari alphabets using transfer learning for Deep Convolution Neural Network (DCNN).
no code implementations • 18 Jan 2019 • Sandhya Aneja, Nagender Aneja, Md Shohidul Islam
IAT is the time interval between the two consecutive packets received.