Showing 1 - 2 results of 2 for search 'dataset encryption algorithm', query time: 0.03s Refine Results
  1. 1

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…The accuracy of these models largely depends on the size and quality of the training dataset. Training the model with a diversified dataset is necessary to predict new malware accurately. …”
  2. 2

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”