Skip to main content

Research Repository

Advanced Search

Outputs (18)

Can Federated Models Be Rectified Through Learning Negative Gradients? (2024)
Conference Proceeding
Tahir, A., Tan, Z., & Babaagba, K. O. (2024). Can Federated Models Be Rectified Through Learning Negative Gradients?. In Big Data Technologies and Applications (18-32). https://doi.org/10.1007/978-3-031-52265-9_2

Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is vulnerable to malicious attacks, such as poisoning attacks, and is challen... Read More about Can Federated Models Be Rectified Through Learning Negative Gradients?.

Image Forgery Detection using Cryptography and Deep Learning (2024)
Conference Proceeding
Oke, A., & Babaagba, K. O. (2024). Image Forgery Detection using Cryptography and Deep Learning. In Big Data Technologies and Applications. BDTA 2023 (62-78). https://doi.org/10.1007/978-3-031-52265-9_5

The advancement of technology has undoubtedly exposed everyone to a remarkable array of visual imagery. Nowadays, digital technology is eating away the trust and historical confidence people have in the integrity of imagery. Deep learning is often us... Read More about Image Forgery Detection using Cryptography and Deep Learning.

Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques (2023)
Conference Proceeding
Gomez, L. R., Watt, T., Babaagba, K. O., Chrysoulas, C., Homay, A., Rangarajan, R., & Liu, X. (2023). Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques. In ICISS '23: Proceedings of the 2023 6th International Conference on Information Science and Systems (113-118). https://doi.org/10.1145/3625156.3625173

In recent years, text has been the main form of communication on social media platforms such as Twitter, Reddit, Facebook, Instagram and YouTube. Emotion Recognition from these platforms can be exploited for all sorts of applications. Through the mea... Read More about Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques.

A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices (2023)
Book Chapter
Turnbull, L., Tan, Z., & Babaagba, K. O. (2024). A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices. In A. Ismail Awad, A. Ahmad, K. Raymond Choo, & S. Hakak (Eds.), Internet of Things Security and Privacy: Practical and Management Perspectives (24-53). Boca Raton: CRC Press. https://doi.org/10.1201/9781003199410-2

There has been an upsurge in malicious attacks in recent years, impacting computer systems and networks. More and more novel malware families aimed at information assets were launched daily over the past year. A particularly threatening malicious gro... Read More about A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices.

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices (2023)
Conference Proceeding
Spalding, A., Tan, Z., & Babaagba, K. O. (in press). Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. In Proceedings of the 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023)

Data recovery for forensic analysis of both hard drives and solid state media presents its own unique set of challenges. Hard drives face mechanical failures and data fragmentation , but their sequential storage and higher success rates make recovery... Read More about Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.

An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware (2023)
Conference Proceeding
Babaagba, K. O., & Wylie, J. (2023). An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware. In GECCO '23 Companion: Proceedings of the Companion Conference on Genetic and Evolutionary Computation (1753-1759). https://doi.org/10.1145/3583133.3596362

Defeating dangerous families of malware like polymorphic and metamorphic malware have become well studied due to their increased attacks on computer systems and network. Traditional Machine Learning (ML) models have been used in detecting this malwar... Read More about An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware.

Evolutionary based Transfer Learning Approach to Improving Classification of Metamorphic Malware (2023)
Conference Proceeding
Babaagba, K. O., & Ayodele, M. (2023). Evolutionary based Transfer Learning Approach to Improving Classification of Metamorphic Malware. In Applications of Evolutionary Computation – 26th International Conference, EvoApplications 2023 (161-176). https://doi.org/10.1007/978-3-031-30229-9_11

The proliferation of metamorphic malware has recently gained a lot of research interest. This is because of their ability to transform their program codes stochastically. Several detectors are unable to detect this malware family because of how quick... Read More about Evolutionary based Transfer Learning Approach to Improving Classification of Metamorphic Malware.

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs (2023)
Conference Proceeding
McLaren, R. A., Babaagba, K., & Tan, Z. (2023). A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. In Machine Learning, Optimization, and Data Science: 8th International Conference, LOD 2022, Certosa di Pontignano, Italy, September 19–22, 2022, Revised Selected Papers, Part II (32-46). https://doi.org/10.1007/978-3-031-25891-6_4

As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based approach. This is due to the emergence of more complex malware families that... Read More about A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.

A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling (2022)
Conference Proceeding
Turnbull, L., Tan, Z., & Babaagba, K. (2022). A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. In 2022 IEEE Conference on Dependable and Secure Computing (DSC). https://doi.org/10.1109/DSC54232.2022.9888906

Malicious software trends show a persistent yearly increase in volume and cost impact. More than 350,000 new malicious or unwanted programs that target various technologies were registered daily over the past year. Metamorphic malware is a specifical... Read More about A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling.

Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings (2022)
Book
Jiménez Laredo, J. L., Hidalgo, J. I., & Babaagba, K. O. (Eds.). (2022). Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings. Cham: Springer. https://doi.org/10.1007/978-3-031-02462-7

This book constitutes the refereed proceedings of the 25th International Conference on Applications of Evolutionary Computation, EvoApplications 2022, held as part of Evo*2022, in April 2022, co-located with the Evo*2022 events EuroGP, EvoCOP, and Ev... Read More about Applications of Evolutionary Computation: 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20–22, 2022, Proceedings.

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT (2022)
Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022). Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871

Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant share of total Internet traffic. However, the security and privacy of IoT and... Read More about Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT.

Application of evolutionary machine learning in metamorphic malware analysis and detection (2021)
Thesis
Babaagba, K. O. Application of evolutionary machine learning in metamorphic malware analysis and detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2801469

In recent times, malware detection and analysis are becoming key issues. A dangerous class of malware is metamorphic malware which is capable of modifying its own code and hiding malicious instructions within normal program code. Current malware dete... Read More about Application of evolutionary machine learning in metamorphic malware analysis and detection.

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples (2020)
Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (2020). Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. . https://doi.org/10.1109/CEC48606.2020.9185668

Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this, we explore whether machine-learning models can be improved by augmenting t... Read More about Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples.

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites (2020)
Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2020). Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation. EvoApplications 2020 (117-132). https://doi.org/10.1007/978-3-030-43722-0_8

In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model resistant to future attacks. In this paper, we use a Multi-dimensional Archi... Read More about Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites.

Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme (2019)
Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2019). Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. In Dependability in Sensor, Cloud, and Big Data Systems and Applications (369-382). https://doi.org/10.1007/978-981-15-1304-6_29

The ability to detect metamorphic malware has generated significant research interest over recent years, particularly given its proliferation on mobile devices. Such malware is particularly hard to detect via signature-based intrusion detection syste... Read More about Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme.

A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning (2019)
Conference Proceeding
Babaagba, K. O., & Adesanya, S. O. (2019). A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning. In ICEIT 2019: Proceedings of the 2019 8th International Conference on Educational and Information Technology (51–55). https://doi.org/10.1145/3318396.3318448

In this paper, the effect of feature selection in malware detection using machine learning techniques is studied. We employ supervised and unsupervised machine learning algorithms with and without feature selection. These include both classification... Read More about A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning.

A Design of an Agent Based System for Timetabling (2017)
Journal Article
Babaagba, K., & Arekete, S. (2017). A Design of an Agent Based System for Timetabling. International Journal of Engineering Development and Research, 5(2), 1168-1175

Time tabling forms an important part of most educational systems. This is because most educational institutes largely rely on time tables for their day to day activities. A number of these institutions rather use the very strenuous and slow manual ti... Read More about A Design of an Agent Based System for Timetabling.

A Review of Agent Based University Course Time Tabling Systems (2017)
Journal Article
Babaagba, K., & Arekete, S. (2017). A Review of Agent Based University Course Time Tabling Systems. International Journal of Engineering Development and Research, 5(2), 566-568

In this paper, we carry out an extensive survey of various mobile agent systems that have been utilized in solving university course time tabling problem. University time tabling is an NP-hard problem which has been researched by vast amount of resea... Read More about A Review of Agent Based University Course Time Tabling Systems.