AI Medical Compendium Topic

Explore the latest research on artificial intelligence and machine learning in medicine.

Computer Security

Showing 101 to 110 of 352 articles

Clear Filters

Optimized multi-head self-attention and gated-dilated convolutional neural network for quantum key distribution and error rate reduction.

Network (Bristol, England)
Quantum key distribution (QKD) is a secure communication method that enables two parties to securely exchange a secret key. The secure key rate is a crucial metric for assessing the efficiency and practical viability of a QKD system. There are severa...

Computationally intelligent real-time security surveillance system in the education sector using deep learning.

PloS one
Real-time security surveillance and identity matching using face detection and recognition are central research areas within computer vision. The classical facial detection techniques include Haar-like, MTCNN, AdaBoost, and others. These techniques e...

Aligning the domains in cross domain model inversion attack.

Neural networks : the official journal of the International Neural Network Society
Model Inversion Attack reconstructs confidential training dataset from a target deep learning model. Most of the existing methods assume the adversary has an auxiliary dataset that has similar distribution with the private dataset. However, this assu...

A novel approach for APT attack detection based on feature intelligent extraction and representation learning.

PloS one
Advanced Persistent Threat (APT) attacks are causing a lot of damage to critical organizations and institutions. Therefore, early detection and warning of APT attack campaigns are very necessary today. In this paper, we propose a new approach for APT...

Advancements in intrusion detection: A lightweight hybrid RNN-RF model.

PloS one
Computer networks face vulnerability to numerous attacks, which pose significant threats to our data security and the freedom of communication. This paper introduces a novel intrusion detection technique that diverges from traditional methods by leve...

HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization.

Neural networks : the official journal of the International Neural Network Society
Hard-label black-box textual adversarial attacks present a highly challenging task due to the discrete and non-differentiable nature of text data and the lack of direct access to the model's predictions. Research in this issue is still in its early s...

Adversarial Infrared Curves: An attack on infrared pedestrian detectors in the physical world.

Neural networks : the official journal of the International Neural Network Society
Deep neural network security is a persistent concern, with considerable research on visible light physical attacks but limited exploration in the infrared domain. Existing approaches, like white-box infrared attacks using bulb boards and QR suits, la...

End-to-end pseudonymization of fine-tuned clinical BERT models : Privacy preservation with maintained data utility.

BMC medical informatics and decision making
Many state-of-the-art results in natural language processing (NLP) rely on large pre-trained language models (PLMs). These models consist of large amounts of parameters that are tuned using vast amounts of training data. These factors cause the model...

Detecting DoS Attacks through Synthetic User Behavior with Long Short-Term Memory Network.

Sensors (Basel, Switzerland)
With the escalation in the size and complexity of modern Denial of Service attacks, there is a need for research in the context of Machine Learning (ML) used in attack execution and defense against such attacks. This paper investigates the potential ...

Federated Learning Approach for Secured Medical Recommendation in Internet of Medical Things Using Homomorphic Encryption.

IEEE journal of biomedical and health informatics
The concept of Federated Learning (FL) is a distributed-based machine learning (ML) approach that trains its model using edge devices. Its focus is on maintaining privacy by transmitting gradient updates along with users' learning parameters to the g...