Hybrid Explainable AI (XAI) Framework for Detecting Adversarial Attacks in Cyber-Physical Systems
(Mohammad Taufik, Mohammad Saddam Aziz, Aulia Fitriana)
DOI : 10.51903/jtie.v4i1.295
- Volume: 4,
Issue: 1,
Sitasi : 0 22-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Cyber-Physical Systems (CPS) are increasingly deployed in critical infrastructure yet remain vulnerable to adversarial attacks that manipulate sensor data to mislead AI-based decision-making. These threats demand not only high-accuracy detection but also transparency in model reasoning. This study proposes a Hybrid Explainable AI (XAI) Framework that integrates Convolutional Neural Networks (CNN), SHAP-based feature interpretation, and rule-based reasoning to detect adversarial inputs in CPS environments. The framework is tested on two simulation scenarios: industrial sensor networks and autonomous traffic sign recognition. Using datasets of 10,000 samples (50% adversarial via FGSM and PGD), the model achieved an accuracy of 97.25%, precision of 96.80%, recall of 95.90%, and F1-score of 96.35%. SHAP visualizations effectively distinguished between normal and adversarial inputs, and the added explainability module increased inference time by only 8.5% over the baseline CNN (from 18.5 ms to 20.1 ms), making it suitable for real-time CPS deployment. Compared to prior methods (e.g., CNN + Grad-CAM, Random Forest + LIME), the proposed hybrid framework demonstrates superior performance and interpretability. The novelty of this work lies in its tri-level integration of predictive accuracy, explainability, and rule-based logic within a single real-time detection system—an approach not previously applied in CPS adversarial defense. This research contributes toward trustworthy AI systems that are robust, explainable, and secure by design.
|
0 |
2025 |
Lightweight Deepfake Detection on Mobile Devices Using Attention-Enhanced MobileNet and Frequency Domain Analysis
(Mohammad Amen, Mohammed Lauwl Ranam)
DOI : 10.51903/jtie.v4i1.275
- Volume: 4,
Issue: 1,
Sitasi : 0 21-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
The rapid advancement of deepfake technology has raised significant concerns regarding misinformation, privacy breaches, and digital fraud. Existing deepfake detection models, particularly those based on deep learning, often require high computational resources, making them unsuitable for real-time applications on mobile devices. This study aims to develop a lightweight deepfake detection model that enhances accuracy while maintaining computational efficiency. To achieve this, we propose a hybrid approach that integrates Fast Fourier Transform (FFT), MobileNet, and an Attention mechanism. The FFT component enables frequency-domain analysis to detect subtle deepfake artifacts, while MobileNet provides a lightweight convolutional backbone, and the Attention layer enhances feature extraction. The proposed model was evaluated on a benchmark deepfake dataset, and the results demonstrated its superior performance compared to the standard MobileNet model. Specifically, the model achieved an accuracy of 94.2%, an F1-score of 93.8%, and a computational efficiency improvement of 27.5% in comparison to conventional CNN-based approaches. These findings indicate that the integration of FFT and Attention mechanisms significantly enhances the model's capability to distinguish real and manipulated media while reducing computational overhead. The contribution of this study lies in presenting a deepfake detection model that balances accuracy and efficiency, making it suitable for deployment in mobile and resource-constrained environments. Future research should explore further optimization for energy efficiency, the adoption of lightweight Transformer architectures, and extensive testing on diverse datasets to improve robustness against real-world variations.
|
0 |
2025 |
Manajemen Risiko Bisnis Ikan Pindang Perspektif Etika Bisnis Islam
(Mohammad Alief Hidayatullah, Dwi Firlana Rosa)
DOI : 10.55606/jaemb.v5i1.5670
- Volume: 5,
Issue: 1,
Sitasi : 0 21-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.13-Aug-2025
Abstrak:
Risk management in the pindang fish business is very important to maintain business stability and increase consumer confidence. This study aims to analyze the application of risk management in the distribution of pindang fish in Bondowoso Regency based on the perspective of Islamic business ethics. Using a descriptive qualitative approach with a case study method, this research collected data through in-depth interviews, direct observation, and documentation. The analysis technique used is the Miles and Huberman interactive model which includes data reduction, data presentation, and conclusion drawing.The results show that the application of Islamic business ethics principles such as honesty (shiddiq), responsibility (amanah), and justice ('adl) in risk management can improve distribution transparency. Traders who apply the principle of trustworthiness are better able to maintain product quality and fair prices, thereby increasing consumer satisfaction. In addition, the Islamic business ethics approach helps prevent the practice of quality manipulation and price discrepancies, which are often challenges in pindang fish distribution.The conclusion of this study confirms that the integration of Islamic values in distribution risk management not only improves business sustainability but also strengthens long-term relationships with consumers. The study recommends the implementation of stricter sharia-based distribution policies as well as the utilization of technology in the distribution system to improve efficiency and transparency
|
0 |
2025 |
Counselor Application Frontend with Personality- matching Using Android-Based K-Means Clustering Algorithm
(Ifan Perdana Putra, Eko Hari Rachmawanto, Wellia Shinta Sari, Tri Esti Rahayuningtyas, Choerul Umam, Mahadika Pradipta Himawan, Noorayisahbe Bt Mohd Yaacob)
DOI : 10.62411/jais.v9i1.10217
- Volume: 9,
Issue: 1,
Sitasi : 0 21-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
Education is one of the most important things for people to have. Many people are competing for education to increase their abilities. Technology plays a big role in developing access to education to make it easier with many online applications and online classes education becomes easier. However, there are still many unresolved problems in this field of education, namely the emergence of the phenomenon of incompatibility between educators and students so that student interest decreases dramatically because of this. And also, the lack of learning materials taught that are not school subjects such as programming. Therefore, the author and team designed an application where this application can find students a learning mentor outside of school so that they can increase their knowledge. The application also provides a matching feature based on the student's personality so that the student can find a suitable tutor.
|
0 |
2025 |
Implementation Of The Base64 Algorithm For Text Encryption And Decryption Using The Python Programming Language
(Caroko Aji Pamungkas, Zudha Pratama, Ichwan Setiarso, Mohamed Doheir)
DOI : 10.62411/jais.v9i1.10310
- Volume: 9,
Issue: 1,
Sitasi : 0 21-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
The exchange of information on the Internet requires increased protection to avoid potential threats to privacy and security. This study identified the main issues in this regard: the need for simple and effective tools for encoding and decoding messages, and the need to understand Base64 encoding algorithms and concepts. However, to overcome this problem the author developed an application to encode and decode messages/text using the Base64 algorithm and the Python programming language. This application allows users to send secret messages/text securely via and convert the data into Base64 format for secure transmission via text media. It also covers the basics of cryptography, Base64 algorithms, and how to use the Python programming language to develop secure applications. The result of this research is a simple and effective encryption and decryption application. This application provides a solution for users to protect messages or text when they want to change confidential information by converting it to Base64 format. With this application, you can send secret messages or texts with the confidence that only authorized parties can read them. Implementing message encryption and decryption using the Base64 algorithm using Python is an important step in maintaining message privacy and security in the current digital era. This research succeeded in developing an application suitable for this purpose. Therefore, the next step is to improve the security of your application by implementing stronger encryption algorithms. Additionally, we provide a more comprehensive user guide to help users better understand cryptographic concepts. Further research may focus on integrating applications with broader Internet security protocols to address increasingly complex security threats.
|
0 |
2025 |
Predicting Gold Price Movement Using Long Short-Term Memory Model
(Azaria Beryl Nagata, Moch Sjamsul Hidajat, Dibyo Adi Wibowo, Widyatmoko Widyatmoko, Noorayisahbe Bt Mohd Yaacob)
DOI : 10.62411/jais.v9i1.10305
- Volume: 9,
Issue: 1,
Sitasi : 0 21-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
Gold, as a valuable commodity, has been a primary focus in the global financial market. It is often utilized as an investment instrument due to the belief in its potential price appreciation. However, the unpredictable and complex movement of gold prices poses a significant challenge in investment decision-making. Therefore, this research aims to address this issue by proposing the use of the Long Short-Term Memory (LSTM) model in time series analysis. LSTM is a robust approach to understanding patterns and trends in gold price data over time. In the context of time series analysis, historical gold price data includes daily, weekly, and monthly datasets. Each model with its respective dataset is useful for identifying patterns in gold prices. The daily model achieves an MSE of 452.2284140627481 and an RMSE of 21.26566279387379. The weekly model achieves an MSE of 1346.1816584357384 and an RMSE of 36.69034830082345. The monthly model achieves an MSE of 11649.597907584808 and an RMSE of 107.93330305139747. With these RMSE results, the LSTM model can predict gold prices effectively. Based on the trained models, it can also be concluded that gold prices exhibit long-term temporal dependence.
|
0 |
2025 |
Data Mining Application Analyzing Customer Purchase Patterns Using The Apriori Algorithm
(Moh. Lambang Prayugo, Dibyo Adi Wibowo, Moch. Sjamsul Hidajat, Ery Mintorini, Rabei Raad Ali)
DOI : 10.62411/jais.v9i1.10308
- Volume: 9,
Issue: 1,
Sitasi : 0 21-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
The study aims to implement Data Mining with Apriori Algorithm and Association Methods (shop cart analysis) to analyze the sales pattern of Kaffa Beauty Shop stores as a case study. Sales information obtained from stores is used to find out the repeated buying habits of cosmetic products. This analysis provides store owners with valuable information to make more useful decisions about product inventory management, marketing strategies, and other aspects of their business. The Apriori Algorithm implementation follows steps including data preprocessing, subsetting, frequent dataset search, and strong association rules (strong Association Rules). The results of the analysis show that there are important purchasing patterns among some cosmetic products that can be the basis of a more effective sales strategy. The study helps understand how data mining and Apriori Algorithms can be applied in business contexts such as Kaffa Beauty Shop stores. Therefore, the results of this analysis are expected to contribute greatly to improving business efficiency and optimizing marketing strategies for store owners and stakeholders. The research is also expected to show the enormous potential of data analysis to support optimal business decision making.
|
0 |
2025 |
KEKUATAN EKSEKUTORIAL PENYELESAIAN SENGKETA KREDIT FIKTIF DI SEKTOR PERBANKAN MELALUI PENDEKATAN MEDIASI
(Mohamad Batu, Melki T. Tunggati)
DOI : 10.26623/slr.v6i1.10955
- Volume: 6,
Issue: 1,
Sitasi : 0 18-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.09-Jul-2025
Abstrak:
This scientific article discusses the mechanism for resolving fictitious credit disputes in banking institutions based on a mediation approach and the executorial power of resolving fictitious credit disputes in the banking sector through mediation. The research method uses normative juridical research, with a legal approach and conceptual approach. The data source of this research comes from secondary data which includes primary, secondary, and tertiary legal materials. All legal materials were analysed using analytical descriptive analysis method. The results of this study indicate that the mechanism for resolving fictitious credit disputes within banking institutions through mediation does not use the mediation mechanism stipulated in Bank Indonesia Regulation (PBI) Number: 8/5/PBI/2006, as amended by Bank Indonesia Regulation Number 10/1/PBI/2008 concerning Banking Mediation, because it has a limited scope of dispute resolution, therefore the mediation procedure refers to LAPS SJK Regulation No. PER-01/LAPS-SJK/I/2021 concerning Mediation Rules and Procedures. However, the polemic over mediated dispute resolution lies in the extent to which the executorial power of the implementation of the mediated agreement can be implemented by the parties/applicants in good faith. LAPS Regulation No. PER-01/LAPS-SJK/I/2021 on Mediation Rules and Procedures provides clarity regarding the enforceability of mediation agreements in fictitious bank loan disputes, but the obligation to convert mediation agreements into peace deeds is not emphasised in the regulation. A deed of peace has the same power as an inkracht court decision, is final and binding, has perfect evidentiary power, and has executorial power that cannot be challenged or rebutted.Abstrak
Artikel ilmiah ini membahas tentang mekanisme penyelesaian sengketa kredit fiktif pada lembaga perbankan berdasarkan pendekatan mediasi serta kekuatan eksekutorial penyelesaian sengketa kredit fiktif di sektor perbankan melalui mediasi. Metode penelitian menggunakan jenis penelitian yuridis normatif, dengan pendekatan Undang-Undang dan pendekatan konseptual. Sumber data penelitian ini berasal dari data sekunder yang didalamnya meliputi bahan hukum primer, sekunder, dan tersier. Semua bahan hukum dianalisis menggunakan metode analisis deskriptif analitis. Hasil penelitian ini menunjukkan bahwa mekanisme penyelesaian sengketa kredit fiktif di lingkungan lembaga perbankan melalui mediasi tidak menggunakan mekanisme mediasi yang diatur dalam Peraturan Bank Indonesia (PBI) Nomor: 8/5/PBI/2006, sebagaimana telah dirubah dengan Peraturan Bank Indonesia Nomor 10/1/PBI/2008 tentang Mediasi Perbankan, karena memilki keterbatasan ruang lingkup penyelesaian sengketa, maka dari itu acara mediasi merujuk pada Peraturan LAPS SJK No. PER-01/LAPS-SJK/I/2021 tentang Peraturan dan Acara Mediasi. Hanya saja, polemik penyelesaian sengketa secara mediasi terletak pada sejauhmana kekuatan eksekutorial pelaksanaan kesepakatan hasil mediasi tersebut dapat dilaksanakan oleh para pihak/pemohon dengan penuh itikad baik. Keberadaan Peraturan LAPS SJK No. PER-01/LAPS-SJK/I/2021 tentang Peraturan dan Acara Mediasi sudah memberikan kejelasan terkait kekuatan eksekutorial kesepakatan hasil mediasi pada sengketa kredit fiktif perbankan, hanya saja kewajiban untuk mengkonversi kesepakatan hasil mediasi ke dalam akta perdamaian tidak ditegaskan dalam peraturan tersebut. Akta perdamaian memilki kekuatan yang sama seperti putusan pengadilan yang sudah inkracht, bersifat final dan mengikat, memiliki kekuatan pembuktian sempurna, serta memiliki kekuatan eksekutorial yang tidak dapat dilakukan perlawanan ataupun bantahan.
|
0 |
2025 |
The Role of Value Creativity Capabilities as a Driving Force to Address Customer Boycott Behaviour Through the Mediating Role of Marketing Excellence
(Muthanna Twfiq Abdul –Hassan, Mohammed Ahmed Mhmood, Roaa Abdul Kareem Sahib)
DOI : 10.70062/harmonieconomics.v2i2.222
- Volume: 2,
Issue: 2,
Sitasi : 0 15-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.06-Aug-2025
Abstrak:
The current research seeks to identify the role of value Creativity capabilities through its dimensions (environmental value, utility value, achievement value, intrinsic value) in addressing the behaviour of the customer boycott, through the mediating role of marketing excellence through its dimensions (service quality, customer retention, innovation of new services, appropriate price, continuous improvement) in Zain Iraq and Asia Cell in the Middle Euphrates region in (Najaf, Karbala, Babylon, Diwaniyah, Muthanna). The problem of the study lies in the main question of what is the nature of the relationship between the capabilities of value Creativity and the behaviour of the customer boycott with the presence of the mediating role of marketing excellence, and the study used the questionnaire to collect data, as it distributed (112) questionnaire forms to a random sample of administrative leaders in (Zain Iraq and Asia Cell), and retrieved (104) forms valid for statistical analysis and the data collected was analysed using a set of statistical tests available in the two statistical programmes (SPSS. V.29, 29 (Amos.V. 29), The results of the study confirmed a number of conclusions, the most important of which is the existence of a role for value Creativity capabilities in addressing the behaviour of the customer boycott through the mediating role of marketing excellence, which means the company's interest in improving the level of customer satisfaction by investing its capabilities by providing services and products that meet their needs.
|
0 |
2025 |
Gambaran Motivasi Berprestasi Remaja yang Mengalami Dampak Broken Home di Komunitas Rese Sengkol, Tangerang Selatan
(Dimas Noto Kusumo, Moh. Amin Tohari)
DOI : 10.62383/sosial.v2i2.1471
- Volume: 2,
Issue: 2,
Sitasi : 0 15-Apr-2025
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
This article aims to analyze and describe the achievement motivation of adolescents affected by broken homes in the Rese Sengkol Community. This research uses a qualitative approach with data collection in the form of interviews, observations and documentation studies. The results showed that achievement motivation is important for every individual, to achieve their goals and develop their potential. Motivation can come from the family, because one of the functions of the family is to support the morale of its members to achieve, but not all individuals get this. Broken home family situations are one of the causes, broken homes experienced include life separation and death separation, the factors vary, ranging from house separation, economic factors, to unstable emotions from parents. The impact of broken homes experienced by adolescents is not only negative, such as vulnerable psychological conditions, they put this aside with a supportive community environment. The positive impacts of broken homes include becoming independent, mature, and able to adjust. Achievement motivation is illustrated by the existence of factors that influence adolescent achievement motivation including the figures and characteristics of the models they admire, parental expectations, environmental support, and independent parenting. As a community that focuses on the arts. The implementation of achievement motivation in this community is reflected in the paintings and drawings that are exhibited in art exhibitions.
|
0 |
2025 |