Jayesh Soni

Orcid: 0000-0002-5740-4597

According to our database1, Jayesh Soni authored at least 13 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Quantum LSTM-based approach to cyber threat detection in virtual environment.
J. Supercomput., January, 2025

Analysis of Ansätze Expressibility and Complexity and Their Impact on Classification Accuracy Using QNN and QLSTM.
IEEE Access, 2025

Evaluating Generative AI Models for Image-Text Modification.
IEEE Access, 2025

Quantum Long Sort-Term Memory-based Identification of Distributed Denial of Service Attacks.
Proceedings of the 4th IEEE International Conference on AI in Cybersecurity, 2025

Evaluating Text-Image Alignment using Gecko2K.
Proceedings of the 4th IEEE International Conference on AI in Cybersecurity, 2025

2024
AI-based detection and identification of low-level nuclear waste: a comparative analysis.
Neural Comput. Appl., November, 2024

2023
Vision Transformer-Based Emotion Detection in HCI for Enhanced Interaction.
Proceedings of the Intelligent Human Computer Interaction - 15th International Conference, 2023

2022
A Multi-layered Deep Learning Approach for Human Stress Detection.
Proceedings of the Intelligent Human Computer Interaction, 2022

Ada-Thres: An Adaptive Thresholding Method To Mitigate The False Alarms.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Identifying Groups of Fake Reviewers Using a Semisupervised Approach.
IEEE Trans. Comput. Soc. Syst., 2021

KeyNet: Enhancing Cybersecurity with Deep Learning-Based LSTM on Keystroke Dynamics for Authentication.
Proceedings of the Intelligent Human Computer Interaction, 2021

2020
Learning-based models to detect runtime phishing activities using URLs.
Proceedings of the ICCDA 2020: The 4th International Conference on Compute and Data Analysis, 2020

2019
Deep learning approach to detect malicious attacks at system level: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019


  Loading...