Search Results for author: Vinayakumar R

Found 14 papers, 3 papers with code

Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream

no code implementations31 Mar 2020 Simran K, Prathiksha Balakrishna, Vinayakumar R, Soman Kp

In recent days, the amount of Cyber Security text data shared via social media resources mainly Twitter has increased.

BIG-bench Machine Learning

Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security

no code implementations31 Mar 2020 Simran K, Sriram S, Vinayakumar R, Soman Kp

In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased.

named-entity-recognition Named Entity Recognition +1

Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network

no code implementations1 Oct 2019 Shisrut Rawat, Aishwarya Srinivasan, Vinayakumar R

Security analysts and administrators face a lot of challenges to detect and prevent network intrusions in their organizations, and to prevent network breaches, detecting the breach on time is crucial.

BIG-bench Machine Learning Feature Engineering +1

Emotion Detection using Data Driven Models

no code implementations10 Jan 2019 Naveenkumar K S, Vinayakumar R, Soman Kp

In this paper the text data is used for the classification of the emotions.

Decision Making

RNNSecureNet: Recurrent neural networks for Cyber security use-cases

no code implementations5 Jan 2019 Mohammed Harun Babu R, Vinayakumar R, Soman Kp

Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks.

Fraud Detection General Classification +1

A Deep Learning Approach for Similar Languages, Varieties and Dialects

no code implementations2 Jan 2019 Vidya Prasad K, Akarsh S, Vinayakumar R, Soman Kp

Deep learning mechanisms are prevailing approaches in recent days for the various tasks in natural language processing, speech recognition, image processing and many others.

Dialect Identification speech-recognition +1

A short review on Applications of Deep learning for Cyber security

no code implementations15 Dec 2018 Mohammed Harun Babu R, Vinayakumar R, Soman Kp

This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis.

Android Malware Detection BIG-bench Machine Learning +3

Deep-Net: Deep Neural Network for Cyber Security Use Cases

1 code implementation9 Dec 2018 Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman Kp

In this paper, we attempt to apply DNNs on three different cyber security use cases: Android malware classification, incident detection and fraud detection.

Fraud Detection General Classification +1

DeepImageSpam: Deep Learning based Image Spam Detection

1 code implementation3 Oct 2018 Amara Dinesh Kumar, Vinayakumar R, Soman Kp

Hackers and spammers are employing innovative and novel techniques to deceive novice and even knowledgeable internet users.

BIG-bench Machine Learning General Classification +1

A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities

no code implementations3 Oct 2018 Amara Dinesh Kumar, Koti Naga Renu Chebrolu, Vinayakumar R, Soman Kp

Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in developing the autonomous vehicles.

Autonomous Vehicles

Deep Health Care Text Classification

no code implementations23 Oct 2017 Vinayakumar R, Barathi Ganesh HB, Anand Kumar M, Soman Kp

This working note presents the Recurrent neural network (RNN) and Long short-term memory (LSTM) based embedding for automatic health text classification in the social media mining.

Feature Engineering General Classification +2

Cannot find the paper you are looking for? You can Submit a new open access paper.