Skip to main content

Showing 1–6 of 6 results for author: Kale, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.14775  [pdf

    cs.NE cs.AI

    Hybrid Firefly-Genetic Algorithm for Single and Multi-dimensional 0-1 Knapsack Problems

    Authors: Aswathi Malanthara, Ishaan R Kale

    Abstract: This paper addresses the challenges faced by algorithms, such as the Firefly Algorithm (FA) and the Genetic Algorithm (GA), in constrained optimization problems. While both algorithms perform well for unconstrained problems, their effectiveness diminishes when constraints are introduced due to limitations in exploration, exploitation, and constraint handling. To overcome these challenges, a hybrid… ▽ More

    Submitted 31 December, 2024; originally announced January 2025.

  2. arXiv:2310.04020  [pdf

    cs.NE

    Snail Homing and Mating Search Algorithm: A Novel Bio-Inspired Metaheuristic Algorithm

    Authors: Anand J Kulkarni, Ishaan R Kale, Apoorva Shastri, Aayush Khandekar

    Abstract: In this paper, a novel Snail Homing and Mating Search (SHMS) algorithm is proposed. It is inspired from the biological behaviour of the snails. Snails continuously travels to find food and a mate, leaving behind a trail of mucus that serves as a guide for their return. Snails tend to navigate by following the available trails on the ground and responding to cues from nearby shelter homes. The prop… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

    Comments: 46 Pages, 11 Figures, 24 Tables

  3. Few-shot Weakly-supervised Cybersecurity Anomaly Detection

    Authors: Rahul Kale, Vrizlynn L. L. Thing

    Abstract: With increased reliance on Internet based technologies, cyberattacks compromising users' sensitive data are becoming more prevalent. The scale and frequency of these attacks are escalating rapidly, affecting systems and devices connected to the Internet. The traditional defense mechanisms may not be sufficiently equipped to handle the complex and ever-changing new threats. The significant breakthr… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

    Comments: Computer and Security (Elsevier)

  4. arXiv:2303.16908  [pdf

    cs.NE cs.AI

    Hybrid ACO-CI Algorithm for Beam Design problems

    Authors: Ishaan R Kale, Mandar S Sapre, Ayush Khedkar, Kaustubh Dhamankar, Abhinav Anand, Aayushi Singh

    Abstract: A range of complicated real-world problems have inspired the development of several optimization methods. Here, a novel hybrid version of the Ant colony optimization (ACO) method is developed using the sample space reduction technique of the Cohort Intelligence (CI) Algorithm. The algorithm is developed, and accuracy is tested by solving 35 standard benchmark test functions. Furthermore, the const… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  5. arXiv:2212.03711  [pdf

    math.OC cs.AI cs.NE

    A socio-physics based hybrid metaheuristic for solving complex non-convex constrained optimization problems

    Authors: Ishaan R Kale, Anand J Kulkarni, Efren Mezura-Montes

    Abstract: Several Artificial Intelligence based heuristic and metaheuristic algorithms have been developed so far. These algorithms have shown their superiority towards solving complex problems from different domains. However, it is necessary to critically validate these algorithms for solving real-world constrained optimization problems. The search behavior in those problems is different as it involves lar… ▽ More

    Submitted 2 September, 2022; originally announced December 2022.

  6. A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

    Authors: Rahul Kale, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

    Abstract: Cyber intrusion attacks that compromise the users' critical and sensitive data are escalating in volume and intensity, especially with the growing connections between our daily life and the Internet. The large volume and high complexity of such intrusion attacks have impeded the effectiveness of most traditional defence techniques. While at the same time, the remarkable performance of the machine… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

    Comments: Keywords: Cybersecurity, Anomaly Detection, Intrusion Detection, Deep Learning, Unsupervised Learning, Neural Networks; https://ieeexplore.ieee.org/document/9799486

    Journal ref: IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp. 137-142. IEEE, 2022