Detection of Malicious Applications Using YOLO V3-Spatial Pyramid Pooling over Optical Character Recognition for Computing Access Time

Devi T., Gowtham V.

2023

Abstract

The goal of research is to use the Novel YOLO V3 SPP for detecting malicious applications while comparing it with the OCR technique for computation of access time. Materials and Methods: The Innovative YOLO V3 SPP algorithm is used to determine access time using a sample size of (N=25), a total sample size of (N=50), and G power is computed to be 80%. In terms of data exploitation prediction, the Novel YOLO V3 SPP has an access time that is slower (83.36ms) than the OCR algorithm's (79.64ms). According to the results, there is no statistically significant difference between the Novel YOLO V3 SPP Algorithm and the OCR Algorithm with p=0.218 (independent sample t-test p<0.05). In comparison to OCR's access time of 79.64ms, the novel YOLO V3 SPP method predicts vulnerabilities in native programmes with a longer access time of 83.36ms.

Download


Paper Citation


in Harvard Style

T. D. and V. G. (2023). Detection of Malicious Applications Using YOLO V3-Spatial Pyramid Pooling over Optical Character Recognition for Computing Access Time. In Proceedings of the 1st International Conference on Artificial Intelligence for Internet of Things: Accelerating Innovation in Industry and Consumer Electronics - Volume 1: AI4IoT; ISBN 978-989-758-661-3, SciTePress, pages 514-519. DOI: 10.5220/0012571800003739


in Bibtex Style

@conference{ai4iot23,
author={Devi T. and Gowtham V.},
title={Detection of Malicious Applications Using YOLO V3-Spatial Pyramid Pooling over Optical Character Recognition for Computing Access Time},
booktitle={Proceedings of the 1st International Conference on Artificial Intelligence for Internet of Things: Accelerating Innovation in Industry and Consumer Electronics - Volume 1: AI4IoT},
year={2023},
pages={514-519},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012571800003739},
isbn={978-989-758-661-3},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 1st International Conference on Artificial Intelligence for Internet of Things: Accelerating Innovation in Industry and Consumer Electronics - Volume 1: AI4IoT
TI - Detection of Malicious Applications Using YOLO V3-Spatial Pyramid Pooling over Optical Character Recognition for Computing Access Time
SN - 978-989-758-661-3
AU - T. D.
AU - V. G.
PY - 2023
SP - 514
EP - 519
DO - 10.5220/0012571800003739
PB - SciTePress