Search Results - "Mtetwa, Nhamoinesu"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection by Qureshi, Ayyaz-Ul-Haq, Larijani, Hadi, Mtetwa, Nhamoinesu, Javed, Abbas, Ahmad, Jawad

    Published in Computers (Basel) (01-09-2019)
    “…The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has…”
    Get full text
    Journal Article
  2. 2

    An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm by Qureshi, Ayyaz Ul Haq, Larijani, Hadi, Yousefi, Mehdi, Adeel, Ahsan, Mtetwa, Nhamoinesu

    Published in Computers (Basel) (01-09-2020)
    “…In today’s digital world, the information systems are revolutionizing the way we connect. As the people are trying to adopt and integrate intelligent systems…”
    Get full text
    Journal Article
  3. 3

    Intrusion Detection Using Swarm Intelligence by Qureshi, Ayyaz-Ul-Haq, Larijani, Hadi, Javed, Abbas, Mtetwa, Nhamoinesu, Ahmad, Jawad

    “…Recent advances in networking and communication technologies have enabled Internet-of-Things (IoT) devices to communicate more frequently and faster. An IoT…”
    Get full text
    Conference Proceeding
  4. 4

    A tool for synthesizing spike trains with realistic interference by Smith, Leslie S., Mtetwa, Nhamoinesu

    Published in Journal of neuroscience methods (15-01-2007)
    “…Spike detection and spike sorting techniques are often difficult to assess because of the lack of ground truth data (i.e., spike timings for each neuron). This…”
    Get full text
    Journal Article
  5. 5

    Smoothing and thresholding in neuronal spike detection by Mtetwa, Nhamoinesu, Smith, Leslie S.

    Published in NeuroImage (Orlando, Fla.) (01-06-2006)
    “…We discuss spike detection for noisy neuronal data. Robust spike detection techniques are especially important for probes which have fixed electrode sites that…”
    Get full text
    Journal Article
  6. 6

    A Novel Random Neural Network Based Approach for Intrusion Detection Systems by Qureshi, Ayyaz-Ul-Haq, Larijani, Hadi, Ahmad, Jawad, Mtetwa, Nhamoinesu

    “…Computer security and privacy of user specific data is a prime concern in day to day communication. The mass use of internet connected systems has given rise…”
    Get full text
    Conference Proceeding
  7. 7

    An Adversarial Attack Detection Paradigm With Swarm Optimization by Qureshi, Ayyaz-Ul-Haq, Larijani, Hadi, Mtetwa, Nhamoinesu, Yousefi, Mehdi, Javed, Abbas

    “…The rise of smart devices and applications has increased the dependence of human beings on machine learning (ML) based code-driven systems. While many of the…”
    Get full text
    Conference Proceeding
  8. 8

    Precision constrained stochastic resonance in a feedforward neural network by Mtetwa, N., Smith, L.S.

    Published in IEEE transactions on neural networks (01-01-2005)
    “…Stochastic resonance (SR) is a phenomenon in which the response of a nonlinear system to a subthreshold information-bearing signal is optimized by the presence…”
    Get full text
    Journal Article
  9. 9

    Stochastic Resonance and Finite Resolution in a Network of Leaky Integrate-and-Fire Neurons by Mtetwa, Nhamoinesu

    Published 01-01-2003
    “…This thesis is a study of stochastic resonance (SR) in a discrete implementation of a leaky integrate-and-fire (LIF) neuron network. The aim was to determine…”
    Get full text
    Dissertation