Ivan Zelinka

Ivan Zelinka
Institute of Electrical and Electronics Engineers | IEEE · IEEE Computer Society

Professor

About

514
Publications
52,710
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,808
Citations
Additional affiliations
January 2015 - December 2017
VŠB-Technical University of Ostrava
Position
  • Supervisor of TACR - Security of Mobile Devices and Communication, Billateral project between CZ and Vietnam, 2015 - 2017
January 2015 - December 2017
VŠB-Technical University of Ostrava
Position
  • Supervisor of • GAČR P103/15/06700S Unconventional Control of Complex Systems, 2015 - 2017
January 2013 - December 2015
VŠB-Technical University of Ostrava
Position
  • Co-suopervisor of GAČR P103/13/08195S Highly Scalable Parallel and Distributed Methods of Data Processing in E-science, 2013 - 2015
Education
September 2020 - September 2020
VŠB-Technical University of Ostrava
Field of study
  • Informatics
November 2004 - November 2004
Technical University of Brno, Faculty of Electrical Engineering and Communication
Field of study
  • Technical cybernetics
September 1996 - June 2001
Tomas Bata University in Zlín, Faculty of Technology
Field of study
  • Technical cybernetics

Publications

Publications (514)
Article
Full-text available
This paper presents an approach to solve the variant of the well-known Travelling Salesman Problem (TSP) by using a gamesourcing approach. In contemporary literature is TSP solved by wide spectra of modern as well as classical computational methods. We would like to point out the possibility to solve such problems by computer game plying that is ca...
Article
Full-text available
In many recent applications, a graph is used to simulate many complex systems, such as social networks, traffic models or bioinformatics, and the underlying graphs for these systems are very large. Algorithms for mining all frequent subgraphs from a single large graph have attracted much attention and been studied in more detail lately. Mining freq...
Article
Full-text available
Large graphs are often used to simulate and model complex systems in various research and application fields. Because of its importance, frequent subgraph mining (FSM) in single large graphs is a vital issue, and recently, it has attracted numerous researchers, and played an important role in various tasks for both research and application purposes...
Article
Differential Evolution (DE) has been widely appraised as a simple yet robust population-based, non-convex optimization algorithm primarily designed for continuous optimization. Two important control parameters of DE are the scale factor F, which controls the amplitude of a perturbation step on the current solutions and the crossover rate Cr, which...
Preprint
Propagating patterns are used to transfer and process information in chemical and physical prototypes of unconventional computing devices. Logical values are represented by fronts of traveling diffusive, trigger or phase waves. We apply this concept of pattern based computation to develop experimental prototypes of computing circuits implemented in...
Article
Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Coherently, malicious actors are expected to utilize these techniques against current security solutions. Despite the importance of these new potential threats, there remains a paucity of evidence on leveraging these research litera...
Book
The 4th edition of the popular as well as prestigious International Conference on Intelligent Computing and Optimization (ICO) 2021, in short ICO’2021, will be held along an “online” platform, herewith respecting the care for everyone as necessitated by the pandemic COVID-19. The physical conference is foreseen to be celebrated at G Hua Hin Resort...
Chapter
In the contemporary edition, this book of conference proceedings encloses the original and innovative, creative and recreative scientific fields on optimization and optimal control, renewable energy and sustainability, artificial intelligence and operational research, economics and management, smart cities and rural planning, meta-heuristics and bi...
Article
In modern applications, large graphs are usually applied in the simulation and analysis of large complex systems such as social networks, computer networks, maps, traffic networks. Therefore, graph mining is also an interesting subject attracting many researchers. Among them, frequent subgraph mining in a single large graph is one of the most impor...
Article
This article introduces a version of the Self-Organizing Migrating Algorithm with a narrowing search space strategy named iSOMA. Compared to the previous two versions, SOMA T3A and Pareto that ranked 3rd and 5th respectively in the IEEE CEC (Congress on Evolutionary Computation) 2019 competition, the iSOMA is equipped with more advanced features wi...
Article
Random mechanisms including mutations are an internal part of evolutionary algorithms, which are based on the fundamental ideas of Darwin’s theory of evolution as well as Mendel’s theory of genetic heritage. In this paper, we debate whether pseudo-random processes are needed for evolutionary algorithms or whether deterministic chaos, which is not a...
Conference Paper
OCR post-processing is an important step for improving the quality of OCR output texts. Long short-term memory (LSTM) is a deep learning model, which has wide-range applications in many domains like time series prediction, natural language processing and speech recognition. In this paper, we propose an OCR error correction model using neural machin...
Article
Full-text available
This work outlines a practically realizable (i.e., deployable and scalable) yet novel autonomous exploration strategy for unmanned aerial vehicles (UAV), which in our case, corresponds to multi-rotor configurations. Concretely, based on a probabilistic map, UAVs are able to modify their trajectory to localize the required target in unknown areas. T...
Article
The widespread development of the malware industry is considered the main threat to our e-society. Therefore, malware analysis should also be enriched with smart heuristic tools that recognize malicious behaviors effectively. Although the generated API calling graph representation for malicious processes encodes worthwhile information about their m...
Article
In recent months and years, with more and more computers and computer systems becoming the target of cyberattacks. These attacks are gaining strength and the sophistication of the approach in terms of how to attack. Attackers and Defenders are increasingly using artificial intelligence methods to maximize the success of their actions. For a success...
Chapter
In this chapter, we introduce the basic characteristics of swarm intelligence, the path planning problem for robots, and how to apply the self-organizing migrating algorithm, a representative of swarm intelligence to solve that real-world problem. We set up simulations in the Matlab environment with four common possible scenarios to demonstrate the...
Article
The dynamic constrained optimization problems can be a challenge for the optimization algorithms. They must tackle global optimum detection, as well as the change of the environment. Recently, a novel test suite for dynamic constrained optimization was introduced. Furthermore, three well-performed evolutionary algorithms were compared based on it....
Article
Full-text available
Optical character recognition (OCR) systems help to digitize paper-based historical achieves. However, poor quality of scanned documents and limitations of text recognition techniques result in different kinds of errors in OCR outputs. Post-processing is an essential step in improving the output quality of OCR systems by detecting and cleaning the...
Chapter
Artificial intelligence and its subparts (like evolutionary algorithms, machine learning\(,\ldots \)) are search methods that can be used for solving optimization problems. A particular class of algorithms like bioinspired one mimic working principles from natural evolution (or swarm intelligence) by employing a population-based (swarm) approach, l...
Book
Full-text available
For this edition, the conference proceedings cover the innovative, original, and creative research areas of sustainability, smart cities, meta-heuristics optimization, cybersecurity, block chain, big data analytics, IoTs, renewable energy, artificial intelligence, Industry 4.0, modeling, and simulation. The organizing committee would like to sincer...
Chapter
The third edition of the International Conference on Intelligent Computing and Optimization (ICO) ICO’2020 will be held via online platform due to COVID-19 pandemic. The physical conference was held at G Hua Hin Resort & Mall, Hua Hin, Thailand, once the COVID-19 pandemic is recovered. The objective of the international conference is to bring toget...
Book
This book gathers papers presented during the 4th International Conference on Electrical Engineering and Control Applications. It covers new control system models, troubleshooting tips and complex system requirements, such as increased speed, precision and remote capabilities. Additionally, the papers discuss not only the engineering aspects of sig...
Chapter
Evolutionary algorithms (EAs) and deterministic chaos, which is a complex behavior produced by complex as well as simple dynamical systems, are tightly joined to create an interdisciplinary fusion of two interesting areas. This chapter discusses the use of EAs for numerical identification of the existence of the so-called hidden attractors (a full...
Chapter
OCR post-processing is an essential step to improve the accuracy of OCR-generated texts by detecting and correcting OCR errors. In this paper, the OCR texts are resulted from an OCR engine which is based on the attention-based encoder-decoder model for unconstrained Vietnamese handwriting. We identify various kinds of Vietnamese OCR errors and thei...
Chapter
n recent years, computational intelligence methodologies in general and swarm intelligence in particular have become increasingly popular and attracted interest with a dramatic increase in the number of relevant publications. Swarm intelligence (SI) and bio-inspired computing, in general, have successfully adopted in many areas of science and engin...
Conference Paper
Along with the rapid increase in the popularity of online media , the proliferation of fake news and its propagation is also rising. Fake news can propagate with an uncontrollable speed without verification and can cause severe damages. Various machine learning and deep learning approaches have been attempted to classify the real and the false news...
Chapter
Artificial neural networks, evolutionary algorithms (and swarm intelligence) are common algorithms belonging to well known soft-computing algorithms. Both classes of algorithms have their history, principles and represent two different biological areas, converted to computer technology. Despite fact that scientists already exhibited that both syste...
Chapter
The focus of this work is the deeper insight into arising serious research questions connected with the growing popularity of combining metaheuristic algorithms and chaotic sequences showing quasi-periodic patterns. This paper reports analysis on the performance of popular and CEC 2019 competition winning strategy of Differential Evolution (DE), wh...
Chapter
The paper proposes a method for the drone to catch the given target and avoid detected obstacles in its path based on the self-organizing migrating algorithm. In particular, a two-component fitness function is proposed based on the principle that the closer the target, the lower the fitness value, and the closer the obstacle, the higher the fitness...
Chapter
In this paper, we propose an original deep learning framework for malware classifying based on the malware behavior data. Currently, machine learning techniques are becoming popular for classifying malware. However, most of the existing machine learning methods for malware classifying use shallow learning algorithms such as Support Vector Machine,...
Article
Full-text available
With the rapid growth of technology in the digital landscape, cybercriminals attempt to utilize new and sophisticated techniques to autonomous and increase the speed and scale of their attacks. Meanwhile, the Dark Web infrastructures such as Tor, plays a crucial role in the criminal underground, especially for malware devel-opers' communities. It i...
Conference Paper
In recent years, swarm intelligence in particular, and bio-inspired computing, in general, have successfully utilized in a number of majors from science, engineering to industry. Therefore, it is logical to investigate how such techniques might contribute in the field of cybersecurity. This paper covers swarm-based intelligence techniques for enhan...
Article
This paper is discussing our new research direction in the Voynich manuscript research. While our previous papers have been dealing with the research that has been based on fractal property analyses or graph properties analyses, where the graph has been constructed from the Voynich manuscript word sequences (Fig. 1), this paper discusses another ki...
Preprint
Full-text available
Rule 22 elementary cellular automaton (ECA) has a 3--cell neighborhood, binary cell states, where a cell takes state `1' if there is exactly one neighbor, including the cell itself, in state `1'. In Boolean terms the cell-state transition is a XOR function of three cell states. In physico--chemical terms the rule might be seen as describing propaga...
Article
This extended study presents a hybridization of particle swarm optimization (PSO) with complex network construction and analysis. A partial population restart is performed in certain moments of the run of the algorithm based on the information obtained from a complex network analysis. The complex network structure represents the communication in th...
Article
Full-text available
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are...
Article
Full-text available
Malware API call graph derived from API call sequences is considered as a representative technique to understand the malware behavioral characteristics. However, it is troublesome in practice to build a behavioral graph for each malware. To resolve this issue, we examine how to generate a simple behavioral graph that characterizes malware. In this...
Chapter
The dramatic improvements in computational intelligence techniques over recent years have influenced many domains. Hence, it is reasonable to expect that virus writers will taking advantage of these techniques to defeat existing security solution. In this article, we outline a possible dynamic swarm smart malware, its structure, and functionality a...
Chapter
The focus of this work is the deeper insight into arising serious research questions connected with the growing popularity of combining metaheuristic algorithms and chaotic sequences showing quasi-periodic patterns. This paper reports an analysis of population dynamics by linking three elements like distribution of the results, population diversity...
Chapter
In this article, we describe the design and implementation of a variant version of SOMA named SOMA Pareto to solve ten hard problems of the 100-Digit Challenge. The algorithm consists of the following operations: Organization, Migration, and Update. In which, we focus on improving the Organization operation with the adaptive parameters of PRT and S...
Chapter
In this paper, we address 10 basic test functions of the 100-Digit Challenge of the SEMCCO 2019 & FANCCO 2019 Competition by using team-to-team adaptive seft-organizing migrating algorithm - SOMA T3A with many improvements in the Organization, Migration, and Update process, as well as the linear adaptive PRT and the cosine-based adaptive Step. The...
Chapter
In this article we continue in our research which combines three different areas - swarm and evolutionary algorithms, networks and coupled map lattices control. Main aim of this article is to compare networks obtained from best and worst self-organizing migrating algorithm runs. All experiments were done on well known CEC 2014 benchmark functions....
Article
Full-text available
Recent developments in Artificial intelligence (AI) have a vast transformative potential for both cybersecurity defenders and cybercriminals. Anti-malware solutions adopt intelligent techniques to detect and prevent threats to the digital space. In contrast, cybercriminals are aware of the new prospects too and will probably try to use it in their...
Article
Full-text available
Current commercial antivirus detection engines still rely on signature-based methods. However, with the huge increase in the number of new malware, current detection methods become not suitable. In this paper, we introduce a malware detection model based on ensemble learning. The model is trained using the minimum number of signification features t...
Chapter
The second edition of the International Conference on Intelligent Computing and Optimization (ICO)—ICO 2019 is held during October 3–4, 2019, at Baywater Resort in Koh Samui, Thailand. The objective of the international conference is to bring together the global research scholars, experts and scientists in the research areas of Intelligent Computin...
Book
The emerging challenges of science and engineering, of economies and societies, of sustainability and social complexity, of Operational Research and decision-making, are becoming recognized and acknowledged worldwide more and more. Thorough multidisciplinary research is urgently needed for finding accurate and, at the same time, stable solutions, f...
Article
The self-organizing migrating algorithm is a population-based algorithm belonging to swarm intelligence, which has been successfully applied in several areas for solving non-trivial optimization problems. However, based on our experiments, the original formulation of this algorithm suffers with some shortcomings as loss of population diversity, pre...
Chapter
In this article, we review how to capture the swarm and evolutionary algorithm dynamic into a network, and we show how we can cover the dynamical network into a coupled map lattices. The main part of this article focuses on the control of the algorithm via the coupled map lattices. Mainly, we concentrate on the statical control and the differential...
Article
Full-text available
Natural systems often exhibit chaotic behavior in their space-time evolution. Systems transiting between chaos and order manifest a potential to compute, as shown with cellular automata and artificial neural networks. We demonstrate that swarm optimization algorithms also exhibit transitions from chaos, analogous to a motion of gas molecules, when...
Conference Paper
In this paper, we analyze the convergence behavior of Differential Evolution (DE) and theoretically prove that under certain adversarial conditions, the generic DE algorithm may not at all converge to the global optimum even on apparently simpler fitness landscapes. We characterize these function classes and initialization conditions theoretically...
Conference Paper
In this paper, we apply the SOMA T3A algorithm to solve 10 hard problems of the 100-Digit Challenge of the GECCO 2019 Competition. With effective improvements in choosing Migrants and Leader in the organization process, as well as the Step and PRT adaptive parameters in the migration process, the algorithm has achieved promising results. The total...
Conference Paper
The dramatic improvements in computational intelligence techniques over recent years have influenced many domains. Hence, it is reasonable to expect that virus writers will taking advantage of these techniques to defeat existing security solution. In this article, we outline a possible dynamic swarm smart malware, its structure, and functionality a...
Conference Paper
In this article, we describe the design and implementation of a variant version of SOMA named SOMA Pareto to solve ten hard problems of the 100-Digit Challenge. The algorithm consists of the following operations: Organization, Migration, and Update. In which, we focus on improving the Organization operation with the adaptive parameters of P RT and...
Article
In this paper, we propose a new method named Pareto-based self-organizing migrating algorithm (SOMA Pareto), in which the algorithm is divided into the Organization, Migration, and Update processes. The important key in the Organization process is the application of the Pareto Principle to select the Migrant and the Leader, increasing the performan...
Article
In this article, a novel leader selection strategy for the self-organizing migrating algorithm is introduced. This strategy replaces original AllToOne and AllToRand strategies. It is shown and statistically tested, that the new strategy outperforms the original ones. All the experiments were conducted on well known CEC 2014 benchmark functions acco...
Chapter
This paper presents a method for swarm robot to catch the moving target and to avoid multiple dynamic obstacles in the unknown environment. An imaginary map is built, including the highest mountain, some small hills, and a lowest lying land, respectively corresponding to the starting position of the robot, the detected obstacles, and the target. Th...
Chapter
This research represents a detailed insight into the modern and popular hybridization of unconventional quasiperiodic/chaotic sequences and evolutionary computation. It is aimed at the influence of different randomization schemes on the population diversity, thus on the performance, of two selected adaptive Differential Evolution (DE) variants. Exp...
Conference Paper
The rapid development of Internet services also led to a significant increase in cyber-attacks. Cyber threats are becoming more sophisticated and automation, make the protections ineffective. Conventional cybersecurity approaches have a limited effect on fighting new cyber threats. Therefore, we need new approaches, and Artificial Intelligence (AI)...
Chapter
This paper presents an impact of security aspects at the IOTA protocol. Based on the different usage of computational resources and the difficulty of the selected Proof of Work (PoW) algorithms have been explored the consequences in the final behavior of the IOTA network and the throughput of the protocol implementation. The main feature of the IOT...
Book
This book is intended for researchers, engineers, and advanced postgraduate students in control and electrical engineering, computer science, signal processing, as well as mechanical and chemical engineering.
Article
In this study, we propose a repulsive mechanism for the Particle Swarm Optimization algorithm that improves its performance on multi-modal problems. The repulsive mechanism is further extended with a distance-based modification. The results are presented and tested for statistical significance. We discuss the observations and propose further direct...
Article
This research represents a detailed insight into the modern and popular hybridization of deterministic chaotic dynamics and evolutionary computation. It is aimed at the influence of chaotic sequences on the performance of four selected Differential Evolution (DE) variants. The variants of interest were: original DE/Rand/1/ and DE/Best/1/ mutation s...
Conference Paper
This paper presents an application of Apache Spark cluster for processing of selected marketing data. Based on available realistic data, Azure cluster is reused. Due to a complexity of the infrastructure and running environment, we used cloud resources for deploying and executing target simulations. Outputs then represents analysis of the links bet...
Conference Paper
This research deals with the constrained industrial optimization task, which is the optimization of technological parameters for the waste processing batch reactor. This paper provides a closer insight into the performance of connection between constrained optimization and different strategies of Differential Evolution (DE). Thus, the motivation be...
Chapter
The first edition of the International Conference on Intelligent Computing and Optimization (ICO 2018) will be held during October 4–5, 2018, at Hard Rock Hotel Pattaya in Pattaya, Thailand. The objective of the international conference is to bring together the global research scholars, experts, and scientists in the research areas of Intelligent C...