-
1
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…The accuracy of these models largely depends on the size and quality of the training dataset. Training the model with a diversified dataset is necessary to predict new malware accurately. …”
-
2
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”