AIMC Topic: Computer Security

Clear Filters Showing 1 to 10 of 380 articles

False-positive tolerant model misconduct mitigation in distributed federated learning on electronic health record data across clinical institutions.

Scientific reports
As collaborative Machine Learning on cross-institutional, fully distributed networks become an important tool in predictive health modeling, its inherent security risks must be addressed. One among such risks is the lack of a mitigation strategy agai...

A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.

Scientific reports
Internet of Health Things (IoHT) plays a vital role in everyday routine by giving electronic healthcare services and the ability to improve patient care quality. IoHT applications and devices become widely susceptible to cyber-attacks as the tools ar...

Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation.

Scientific reports
Medical image encryption is important for maintaining the confidentiality of sensitive medical data and protecting patient privacy. Contemporary healthcare systems store significant patient data in text and graphic form. This research proposes a New ...

An explainable federated blockchain framework with privacy-preserving AI optimization for securing healthcare data.

Scientific reports
With the rapid growth of healthcare data and the need for secure, interpretable, and decentralized machine learning systems, Federated Learning (FL) has emerged as a promising solution. However, FL models often face challenges regarding privacy prese...

XAI-XGBoost: an innovative explainable intrusion detection approach for securing internet of medical things systems.

Scientific reports
The Internet of Medical Things (IoMT) has transformed healthcare delivery but faces critical challenges, including cybersecurity threats that endanger patient safety and data integrity. Intrusion Detection Systems (IDS) are essential for protecting I...

Design of Block-Scrambling-Based privacy protection mechanism in healthcare using fusion of transfer learning models with Hippopotamus optimization algorithm.

Scientific reports
In the human body, the skin is the main organ. Nearly 30-70% of individuals globally have skin-related health issues, for whom efficient and effective analysis is essential. A general method dermatologists use for analyzing skin illnesses is dermosco...

Adaptive DDoS detection mode in software-defined SIP-VoIP using transfer learning with boosted meta-learner.

PloS one
The Internet has continued to provision its infrastructure as a platform for competitive marketing, enhanced productivity, and monetization efficacy. However, it has become a means for adversaries to exploit unsuspecting users and, in turn, compromis...

Construction of VAE-GRU-XGBoost intrusion detection model for network security.

PloS one
With the advent of the big data era, the threat of network security is becoming increasingly severe. In order to cope with complex network attacks and ensure network security, a network intrusion detection model is constructed relying on deep learnin...

Pursuit of Digital Innovation in Psychiatric Data Handling Practices in Ireland: Comprehensive Case Study.

JMIR human factors
BACKGROUND: Ireland is ranked among the most disadvantageous European countries in terms of mental health challenges. Contrary to general health services that primarily focus on diagnosis and treatment, the mental health sector in Ireland deals with ...

Adaptive network steganography using deep learning and multimedia video analysis for enhanced security and fidelity.

PloS one
This study presents an advanced adaptive network steganography paradigm that integrates deep learning methodologies with multimedia video analysis to enhance the universality and security of network steganography practices. The proposed approach util...