AI Medical Compendium Topic

Explore the latest research on artificial intelligence and machine learning in medicine.

Computer Security

Showing 111 to 120 of 352 articles

Clear Filters

IoMT-Based Smart Healthcare Detection System Driven by Quantum Blockchain and Quantum Neural Network.

IEEE journal of biomedical and health informatics
Electrocardiogram (ECG) is the main criterion for arrhythmia detection. As a means of identification, ECG leakage seems to be a common occurrence due to the development of the Internet of Medical Things. The advent of the quantum era makes it difficu...

Machine learning cryptography methods for IoT in healthcare.

BMC medical informatics and decision making
BACKGROUND: The increased application of Internet of Things (IoT) in healthcare, has fueled concerns regarding the security and privacy of patient data. Lightweight Cryptography (LWC) algorithms can be seen as a potential solution to address this con...

An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL).

PloS one
Web applications are important for various online businesses and operations because of their platform stability and low operation cost. The increasing usage of Internet-of-Things (IoT) devices within a network has contributed to the rise of network i...

Fast synchronization control and application for encryption-decryption of coupled neural networks with intermittent random disturbance.

Neural networks : the official journal of the International Neural Network Society
In this paper, we design a new class of coupled neural networks with stochastically intermittent disturbances, in which the perturbation mechanism is different from other existed random neural networks. It is significant to construct the new models, ...

A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.

PloS one
Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. Multiple network ...

An invisible, robust copyright protection method for DNN-generated content.

Neural networks : the official journal of the International Neural Network Society
Wide deployment of deep neural networks (DNNs) based applications (e.g., style transfer, cartoonish), stimulating the need for copyright protection of such application's production. Though some traditional visible copyright techniques exist, they oft...

Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS.

PloS one
The persistent evolution of cyber threats has given rise to Gen V Multi-Vector Attacks, complex and sophisticated strategies that challenge traditional security measures. This research provides a complete investigation of recent intrusion detection s...

Compression and Encryption of Heterogeneous Signals for Internet of Medical Things.

IEEE journal of biomedical and health informatics
Psychophysiological computing can be utilized to analyze heterogeneous physiological signals with psychological behaviors in the Internet of Medical Things (IoMT). Since IoMT devices are generally limited by power, storage, and computing resources, i...

Interactive attack-defense for generalized person re-identification.

Neural networks : the official journal of the International Neural Network Society
Generalized Person Re-Identification (GReID) aims to develop a model capable of robust generalization across unseen target domains, even with training on a limited set of observed domains. Recently, methods based on the Attack-Defense mechanism are e...