AI Medical Compendium Topic

Explore the latest research on artificial intelligence and machine learning in medicine.

Computer Security

Showing 31 to 40 of 352 articles

Clear Filters

Optimized Adaboost Support Vector Machine-Based Encryption for Securing IoT-Cloud Healthcare Data.

Sensors (Basel, Switzerland)
The Internet of Things (IoT) connects various medical devices that enable remote monitoring, which can improve patient outcomes and help healthcare providers deliver precise diagnoses and better service to patients. However, IoT-based healthcare mana...

Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments.

Sensors (Basel, Switzerland)
The Internet of Medical Things (IoMT) is revolutionizing healthcare by enabling advanced patient care through interconnected medical devices and systems. However, its critical role and sensitive data make it a prime target for cyber threats, requirin...

A novel deep learning-based framework with particle swarm optimisation for intrusion detection in computer networks.

PloS one
Intrusion detection plays a significant role in the provision of information security. The most critical element is the ability to precisely identify different types of intrusions into the network. However, the detection of intrusions poses a importa...

Federated learning with bilateral defense via blockchain.

Neural networks : the official journal of the International Neural Network Society
Federated Learning (FL) offers benefits in protecting client data privacy but also faces multiple security challenges, such as privacy breaches from unencrypted data transmission and poisoning attacks that compromise model performance, however, most ...

Towards practical and privacy-preserving CNN inference service for cloud-based medical imaging analysis: A homomorphic encryption-based approach.

Computer methods and programs in biomedicine
BACKGROUND AND OBJECTIVE: Cloud-based Deep Learning as a Service (DLaaS) has transformed biomedicine by enabling healthcare systems to harness the power of deep learning for biomedical data analysis. However, privacy concerns emerge when sensitive us...

Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model.

PloS one
To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristo...

Neural-network-based practical specified-time resilient formation maneuver control for second-order nonlinear multi-robot systems under FDI attacks.

Neural networks : the official journal of the International Neural Network Society
This paper presents a specified-time resilient formation maneuver control approach for second-order nonlinear multi-robot systems under false data injection (FDI) attacks, incorporating an offline neural network. Building on existing works in integra...

From challenges and pitfalls to recommendations and opportunities: Implementing federated learning in healthcare.

Medical image analysis
Federated learning holds great potential for enabling large-scale healthcare research and collaboration across multiple centers while ensuring data privacy and security are not compromised. Although numerous recent studies suggest or utilize federate...

Reconfigurable security solution based on hopfield neural network for e-healthcare applications.

Scientific reports
In the healthcare sector, e-diagnosis through medical images is essential in a multi-speciality hospital; securing the medical images becomes crucial for preserving an individual's privacy in e-healthcare applications. So, this paper has proposed a n...

Fast finite-time quantized control of multi-layer networks and its applications in secure communication.

Neural networks : the official journal of the International Neural Network Society
This paper introduces a quantized controller to address the challenge of fast finite-time synchronization of multi-layer networks, where each layer represents a distinct type of interaction within complex systems. Firstly, based on the stability theo...