The current industrial control system network is susceptible to data theft attacks such as SQL injection in practical applications, resulting in data loss or leakage of enterprise secrets. To solve the network intrusion problem faced by industrial co...
Skin cancer is one of the most prevalent malignant tumors, and early detection is crucial for patient prognosis, leading to the development of mobile applications as screening tools. Recent advances in deep neural networks (DNNs) have accelerated the...
The rapid proliferation of the Power Internet of Things (PIoT) has given rise to severe network security threats, with eavesdropping attacks emerging as a paramount concern. Traditional eavesdropping detection methods struggle to adapt to complex and...
Secure medical data sharing and access control play a prominent role. However, it is still unclear how to provide a security architecture that can guarantee the privacy and safety of sensitive medical data. Existing methods are application-specific a...
Denial of Wallet (DoW) attacks are a cyber threat designed to utilize and deplete an organization's financial resources by generating excessive prices or charges in their cloud computing (CC) and serverless computing platforms. These threats are prim...
With the increasing reliance on software applications, cybersecurity threats have become a critical concern for developers and organizations. The answer to this vulnerability is AI systems, which help us adapt a little better, as traditional measures...
With an increased chronic disease and an ageing population, remote health monitoring is a substantial method to enhance the care of patients and decrease healthcare expenses. The Internet of Things (IoT) presents a promising solution for remote healt...
In the digital age, privacy preservation is of paramount importance while processing health-related sensitive information. This paper explores the integration of Federated Learning (FL) and Differential Privacy (DP) for breast cancer detection, lever...
This research investigates the application of fuzzy graph theory to address critical security challenges in electromagnetic radiation therapy systems. Through comprehensive theoretical analysis and experimental validation, we introduce novel approach...
BACKGROUND: Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. Ethical risks, particularly from artificial intelligence (AI) data processing, are increasingly recogn...
Join thousands of healthcare professionals staying informed about the latest AI breakthroughs in medicine. Get curated insights delivered to your inbox.