AI Medical Compendium Topic

Explore the latest research on artificial intelligence and machine learning in medicine.

Computer Security

Showing 211 to 220 of 352 articles

Clear Filters

Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset.

Computational intelligence and neuroscience
Networks are exposed to an increasing number of cyberattacks due to their vulnerabilities. So, cybersecurity strives to make networks as safe as possible, by introducing defense systems to detect any suspicious activities. However, firewalls and clas...

A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack.

IEEE/ACM transactions on computational biology and bioinformatics
Deep learning is widely used in the medical field owing to its high accuracy in medical image classification and biological applications. However, under collaborative deep learning, there is a serious risk of information leakage based on the deep con...

NeuroCrypt: Machine Learning Over Encrypted Distributed Neuroimaging Data.

Neuroinformatics
The field of neuroimaging can greatly benefit from building machine learning models to detect and predict diseases, and discover novel biomarkers, but much of the data collected at various organizations and research centers is unable to be shared due...

The influence of random number generation in dissipative particle dynamics simulations using a cryptographic hash function.

PloS one
The tiny encryption algorithm (TEA) is widely used when performing dissipative particle dynamics (DPD) calculations in parallel, usually on distributed memory systems. In this research, we reduced the computational cost of the TEA hash function and i...

Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image Encryption.

IEEE transactions on neural networks and learning systems
The article considers the impulsive synchronization for inertial neural networks with unbounded delay and actuator saturation via sampled-data control. Based on an impulsive differential inequality, the difficulties caused by unbounded delay and impu...

Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing.

Big data
The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization lead to the shift from mobile...

Words as a window: Using word embeddings to explore the learned representations of Convolutional Neural Networks.

Neural networks : the official journal of the International Neural Network Society
As deep neural net architectures minimize loss, they accumulate information in a hierarchy of learned representations that ultimately serve the network's final goal. Different architectures tackle this problem in slightly different ways, but all crea...

Building an adaptive interface via unsupervised tracking of latent manifolds.

Neural networks : the official journal of the International Neural Network Society
In human-machine interfaces, decoder calibration is critical to enable an effective and seamless interaction with the machine. However, recalibration is often necessary as the decoder off-line predictive power does not generally imply ease-of-use, du...

Extracting and inserting knowledge into stacked denoising auto-encoders.

Neural networks : the official journal of the International Neural Network Society
Deep neural networks (DNNs) with a complex structure and multiple nonlinear processing units have achieved great successes for feature learning in image and visualization analysis. Due to interpretability of the "black box" problem in DNNs, however, ...