Akshat Gaurav
YOU?
Author Swipe
View article: AI-optimized GRU-based self-attention model for predictive diabetes staging in IoT healthcare 5.0
AI-optimized GRU-based self-attention model for predictive diabetes staging in IoT healthcare 5.0 Open
In the Healthcare 5.0 environment, the IoT devices are used for collecting the users statics. Hence, IoT devices can be used for the early detection and staging of diabetes. However, due to the complex interrelationship among the healthcar…
View article: Critical Analysis of Advanced Hybrid Models for Mobile Phishing Detection Through Data Mining and Machine Learning
Critical Analysis of Advanced Hybrid Models for Mobile Phishing Detection Through Data Mining and Machine Learning Open
Phishing through mobiles is becoming advanced, attacking the users through malware applications, SMS, and social media. Dynamic threats better the conventional detection techniques, thereby hybrid approaches integrating machine learning, d…
View article: Phishing threat mitigation in E-commerce using a quantum-enhanced hybrid AI framework
Phishing threat mitigation in E-commerce using a quantum-enhanced hybrid AI framework Open
Phishing websites continue to pose a significant cybersecurity threat, exploiting URL structures to deceive users and bypass traditional detection systems. Most existing models rely solely on classical deep learning, which often incurs hig…
View article: Optimized hybrid CNN-LSTM-GRU model for cyber attack detection using Adaptive Equilibrium Optimization
Optimized hybrid CNN-LSTM-GRU model for cyber attack detection using Adaptive Equilibrium Optimization Open
View article: A Hybrid Deep Learning Framework for Intrusion Detection in Database Systems Using Brown-Bear Optimization and Tunicate Swarm Algorithm
A Hybrid Deep Learning Framework for Intrusion Detection in Database Systems Using Brown-Bear Optimization and Tunicate Swarm Algorithm Open
Protection of networks from changing cyberthreats depends critically on intrusion detection. This article presents a hybrid deep learning framework using a tunicate swarm algorithm and brown-bear optimization for intrusion detection. The T…
View article: AI-driven lightweight CNN model for sustainable vegetable classification in smart food systems
AI-driven lightweight CNN model for sustainable vegetable classification in smart food systems Open
View article: Semantic-Aware Lightweight AI Model for Deepfake Image Detection in Online Retail Platforms
Semantic-Aware Lightweight AI Model for Deepfake Image Detection in Online Retail Platforms Open
Deepfake detection in e-commerce platforms demands lightweight, efficient, and accurate models capable of real-time performance. This paper proposes a semantic-aware, lightweight ShuffleNet-based model optimized for detecting image-based d…
View article: AI-Powered Intrusion Detection for Secure and Efficient SDN in Network Virtualization
AI-Powered Intrusion Detection for Secure and Efficient SDN in Network Virtualization Open
Ensuring secure and efficient intrusion detection in Software-Defined Networking (SDN) within network virtualization is crucial for modern cybersecurity. In this context, this work presents an AI-powered hybrid deep learning model integrat…
View article: Integrating AI and Semantic Web Technologies for Robust Phishing Detection in Virtual Realities
Integrating AI and Semantic Web Technologies for Robust Phishing Detection in Virtual Realities Open
Phishing detection is a critical challenge in virtual realities, where malicious activities can compromise user security. This paper presents a novel approach integrating AI and Semantic Web Technologies for robust phishing detection. The …
View article: Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer
Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer Open
The rapid growth of IoT devices has heightened the risk of botnet attacks, calling for scalable and distributed detection solutions. In this context, this study proposes a distributed optimization system for IoT attack detection using CNN …
View article: Smart waste classification in IoT-enabled smart cities using VGG16 and Cat Swarm Optimized random forest
Smart waste classification in IoT-enabled smart cities using VGG16 and Cat Swarm Optimized random forest Open
Effective waste management is becoming a crucial component of sustainable urban development as smart technologies are used by smart cities more and more. Smart trash categorization systems provided by IoT may greatly enhance garbage sortin…
View article: Data-Driven Exploration of Emerging Trends in Sustainable Human Resource Management Using Advanced Analytics
Data-Driven Exploration of Emerging Trends in Sustainable Human Resource Management Using Advanced Analytics Open
This paper uses advanced analytics to explore emerging trends in sustainable human resource management (HRM). Analyzing publications from 1991 to 2023 via the Scopus database identifies key trends and contributions in sustainable HRM resea…
View article: AI-based model for securing cognitive IoT devices in advance communication systems
AI-based model for securing cognitive IoT devices in advance communication systems Open
The pervasive integration of the Cognitive Internet of Things (CIoT) in advanced communication systems has significantly heightened security concerns due to inherent vulnerabilities that cyber attackers exploit. These security challenges a…
View article: Optimized trustworthy visual intelligence model for industrial marble surface anomaly detection
Optimized trustworthy visual intelligence model for industrial marble surface anomaly detection Open
In industrial manufacturing, to ensure the trustworthiness of visual intelligence, it is necessary that models can be able to detect surface anomalies and maintain product quality. In this context, this work provides a trustworthy visual i…
View article: Driver identification in advanced transportation systems using osprey and salp swarm optimized random forest model
Driver identification in advanced transportation systems using osprey and salp swarm optimized random forest model Open
Enhancement of security, personalization, and safety in advanced transportation systems depends on driver identification. In this context, this work suggests a new method to find drivers by means of a Random Forest model optimized using th…
View article: Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection Open
The rise in mobile malware risks brought on by the explosion of Android smartphones required more efficient detection techniques. Inspired by a cascade of Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) networks, optimized usi…
View article: Sustainable Fire Detection in Smart Cities Using ResNet101V2 and Optimized Gradient-Boosting Method
Sustainable Fire Detection in Smart Cities Using ResNet101V2 and Optimized Gradient-Boosting Method Open
View article: AI-Driven Malware Detection with VGG Feature Extraction and Artificial Rabbits Optimized Random Forest Model
AI-Driven Malware Detection with VGG Feature Extraction and Artificial Rabbits Optimized Random Forest Model Open
View article: Prostate cancer detection in intelligent big data systems using omnipresent AI with Fox and Golden Jackal Optimizers
Prostate cancer detection in intelligent big data systems using omnipresent AI with Fox and Golden Jackal Optimizers Open
View article: Advance drought prediction through rainfall forecasting with hybrid deep learning model
Advance drought prediction through rainfall forecasting with hybrid deep learning model Open
Drought is a natural disaster that can affect a larger area over time. Damage caused by the drought can only be reduced through its accurate prediction. In this context, we proposed a hybrid stacked model for rainfall prediction, which is …
View article: A Comprehensive Survey on Federated Learning Applications in Computational Mental Healthcare
A Comprehensive Survey on Federated Learning Applications in Computational Mental Healthcare Open
View article: Optimizing Heart Attack Detection with Brown-Bear Optimization Algorithm and CNN in Healthcare 4.0
Optimizing Heart Attack Detection with Brown-Bear Optimization Algorithm and CNN in Healthcare 4.0 Open
Heart disease is a non-communicable decease that lead to death if not treated. In the world most of the people died due to heart disease because they are not treated on time or their disease is not detected at early stage. Due to this effi…
View article: Enhancing Phishing Detection in Semantic Web Systems Using Optimized Deep Learning Models
Enhancing Phishing Detection in Semantic Web Systems Using Optimized Deep Learning Models Open
Phishing detection in Semantic Web systems is crucial to safeguarding users from malicious attacks. In this context, this work presents a deep learning-based phishing attack detection model using MobileBERT for feature extraction and hyper…
View article: Optimized AI-Driven Semantic Web Approach for Enhancing Phishing Detection in E-Commerce Platforms
Optimized AI-Driven Semantic Web Approach for Enhancing Phishing Detection in E-Commerce Platforms Open
For e-commerce systems, phishing attempts remain a major threat, so sophisticated detection techniques using Semantic Web and artificial intelligence are very necessary. An efficient AI-driven Semantic Web method for phishing detection enh…
View article: Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI
Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI Open
The increasing use of Automatic Dependent Surveillance-Broadcast (ADS-B) technology in flight control systems has created many serious concerns.These weaknesses threaten the security and safety of our aviation industry. Therefore, to enhan…
View article: Bankruptcy forecasting in enterprises and its security using hybrid deep learning models
Bankruptcy forecasting in enterprises and its security using hybrid deep learning models Open
In current scenario when economic and risk management sectors need accurate predictions of enterprise bankruptcy, it is very importance issue to research in the field of security of enterprise bankruptcy. In this context, we propose an hyb…
View article: A bibliometric analysis of environmental education and sustainable entrepreneurship development in a global perspective
A bibliometric analysis of environmental education and sustainable entrepreneurship development in a global perspective Open
This paper provides a bibliometric overview of the interaction between environmental education and the growth of sustainable entrepreneurship. Using VOSViewer and the R programming language, we found 849 reference studies for investigation…
View article: Sustainable IoT Security in Entrepreneurship: Leveraging Univariate Feature Selection and Deep CNN Model for Innovation and Knowledge
Sustainable IoT Security in Entrepreneurship: Leveraging Univariate Feature Selection and Deep CNN Model for Innovation and Knowledge Open
Due to the rapid increase in Internet of Things (IoT) devices in entrepreneurial environments, innovative cybersecurity advancements are needed to defend against escalating cyber threats. The present paper proposes an approach involving un…
View article: A Sustainable W-RLG Model for Attack Detection in Healthcare IoT Systems
A Sustainable W-RLG Model for Attack Detection in Healthcare IoT Systems Open
The increasingly widespread use of IoT devices in healthcare systems has heightened the need for sustainable and efficient cybersecurity measures. In this paper, we introduce the W-RLG Model, a novel deep learning approach that combines Wh…
View article: A Novel Cuckoo Search-Based Optimized Deep CNN Model for Phishing Attack Detection in IoT Environment
A Novel Cuckoo Search-Based Optimized Deep CNN Model for Phishing Attack Detection in IoT Environment Open
There is a serious risk to information privacy and security in the IoT ecosystem from phishing attacks. This research offers a unique strategy for increasing phishing attack detection by employing the Cuckoo Search algorithm to tune hyperp…