Somayeh Mozafari; Amir Jalaly Bidgoly
Abstract
Today, with the advancement of science and technology, the use of smartphones has become very common, and the Android operating system has been able to gain lots of popularity in the meantime. However, these devices face manysecurity challenges, including malware. Malware may cause many problems in both ...
Read More
Today, with the advancement of science and technology, the use of smartphones has become very common, and the Android operating system has been able to gain lots of popularity in the meantime. However, these devices face manysecurity challenges, including malware. Malware may cause many problems in both the security and privacy of users. So far, the state-of-the-art method in malware detection is based on deep learning, however, this approach requires a lot of computing resources and leads to high battery usage, which is unacceptable in smartphone devices. This paper proposes the knowledge distillation approach for lightening android malware detection. To this end, first, a heavy model is taught and then with the knowledge distillation approach, its knowledge is transferred to a light model called student. To simplify the learning process, soft labels are used here. The resulting model, although slightly less accurate in identification, has a much smaller size than the heavier model. Moreover, ensemble learning was proposed to recover the dropped accuracy. We have tested the proposed approach on CISC datasets including dynamic and static features, and the results show that the proposed method is not only able to lighten the model up to 99%, but also maintain the accuracy of the lightened model to the extent of the heavy model.
Norah Alajlan; Meshael Alyahya; Noorah Alghasham; Dina M. Ibrahim
Abstract
Date fruits are considered essential food and the most important agricultural crop in Saudi Arabia. Where Saudi Arabia produces many of the types of dates per year. Collecting large data for date fruits is a difficult task and consumedtime, besides some of the date types are seasonal. Wherein convolutional ...
Read More
Date fruits are considered essential food and the most important agricultural crop in Saudi Arabia. Where Saudi Arabia produces many of the types of dates per year. Collecting large data for date fruits is a difficult task and consumedtime, besides some of the date types are seasonal. Wherein convolutional neural networks (CNN) model needs large datasets to achieve high classification accuracy and avoid the overfitting problem. In this paper, an augmented date fruits dataset was developed using deep convolutional generative adversarial networks techniques (DCGAN). The dataset contains 600 images for three varieties of dates (Sukkari, Suggai and Ajwa). The performance of DCGAN was evaluated using Keras and MobileNet models. An extensive simulation shows the classify using DCGAN with the MobileNet model achieved 88% of accuracy. Whilst 44% for the Keras. Besides, MobileNet achieved better classification in the original dataset.
Isra Al-Turaiki; Najwa Altwaijry; Abeer Agil; Haya Aljodhi; sara Alharbi; Lina Alqassem
Abstract
With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). ...
Read More
With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). These systems are an essential component for ensuring the security of computer networks against attacks. In this paper, two deep learning architectures are proposed for both binary and multi-class classification of network attacks. The models, CNN-IDS and LSTM-IDS, are based on Convolutional Neural Network and Long Short Term Memory architectures, respectively. The models are evaluated using the well-known NSL-KDD dataset. The performance is measured in terms of accuracy, precision, recall, and F-measure. Experimental results show that the models achieve good performance in terms of accuracy and recall. Network intrusion detection systems are an integral part of contemporary networks. They provide administrators with an early warning for known and unknown attacks. In this paper, two deep learning architectures to aid administrators in detecting network attacks are outlined