Skip to main content

Showing 1–3 of 3 results for author: Chapnevis, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2207.04503  [pdf

    cs.CR

    BotNet Intrusion Detection System in Internet of Things with Developed Deep Learning

    Authors: Amirabas Kabiri Zamani, Amirahmad Chapnevis

    Abstract: The rapid growth of technology has led to the creation of computing networks. The applications of the Internet of Things are becoming more and more visible with the expansion and development of sensors and the use of a series of equipment to connect to the Internet. Of course, the growth of any network will also provide some challenges. The main challenge of IoT like any other network is its secur… ▽ More

    Submitted 10 July, 2022; originally announced July 2022.

    Comments: 19 pages, 5 figures

  2. arXiv:2104.01521  [pdf, other

    cs.NE cs.AI cs.LG math.NA

    Golden Tortoise Beetle Optimizer: A Novel Nature-Inspired Meta-heuristic Algorithm for Engineering Problems

    Authors: Omid Tarkhaneh, Neda Alipour, Amirahmad Chapnevis, Haifeng Shen

    Abstract: This paper proposes a novel nature-inspired meta-heuristic algorithm called the Golden Tortoise Beetle Optimizer (GTBO) to solve optimization problems. It mimics golden tortoise beetle's behavior of changing colors to attract opposite sex for mating and its protective strategy that uses a kind of anal fork to deter predators. The algorithm is modeled based on the beetle's dual attractiveness and s… ▽ More

    Submitted 3 April, 2021; originally announced April 2021.

  3. arXiv:2011.00319  [pdf

    cs.CG cs.CR

    A Secure Two-Party Computation Protocol for Intersection Detection between Two Convex Hulls

    Authors: Amirahmad Chapnevis, Babak Sadeghiyan

    Abstract: Intersection detection between three-dimensional bodies has various applications in computer graphics, video game development, robotics as well as military industries. In some respects, entities do not want to disclose sensitive information about themselves, including their location. In this paper, we present a secure two-party protocol to determine the existence of an intersection between entitie… ▽ More

    Submitted 21 May, 2021; v1 submitted 31 October, 2020; originally announced November 2020.

    Comments: 11 Pages, 2 Tables, 40 formulas, and 6 figures This paper is presented in CSICC2019, Computer Society of Iran Computer Conference, Sharif University of Technology, Tehran 2019