AIMC Topic: Computer Security

Clear Filters Showing 41 to 50 of 380 articles

Optimized Adaboost Support Vector Machine-Based Encryption for Securing IoT-Cloud Healthcare Data.

Sensors (Basel, Switzerland)
The Internet of Things (IoT) connects various medical devices that enable remote monitoring, which can improve patient outcomes and help healthcare providers deliver precise diagnoses and better service to patients. However, IoT-based healthcare mana...

Generative adversarial local density-based unsupervised anomaly detection.

PloS one
Anomaly detection is crucial in areas such as financial fraud identification, cybersecurity defense, and health monitoring, as it directly affects the accuracy and security of decision-making. Existing generative adversarial nets (GANs)-based anomaly...

Artificial intelligence and blockchain in clinical trials: enhancing data governance efficiency, integrity, and transparency.

Bioanalysis
This article examines the transformative potential of blockchain technology and its integration with artificial intelligence (AI) in clinical trials, focusing on their combined ability to enhance integrity, operational efficiency, and transparency in...

Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments.

Sensors (Basel, Switzerland)
The Internet of Medical Things (IoMT) is revolutionizing healthcare by enabling advanced patient care through interconnected medical devices and systems. However, its critical role and sensitive data make it a prime target for cyber threats, requirin...

Towards practical and privacy-preserving CNN inference service for cloud-based medical imaging analysis: A homomorphic encryption-based approach.

Computer methods and programs in biomedicine
BACKGROUND AND OBJECTIVE: Cloud-based Deep Learning as a Service (DLaaS) has transformed biomedicine by enabling healthcare systems to harness the power of deep learning for biomedical data analysis. However, privacy concerns emerge when sensitive us...

Investigating the performance of multivariate LSTM models to predict the occurrence of Distributed Denial of Service (DDoS) attack.

PloS one
In the current cybersecurity landscape, Distributed Denial of Service (DDoS) attacks have become a prevalent form of cybercrime. These attacks are relatively easy to execute but can cause significant disruption and damage to targeted systems and netw...

GAN-based data reconstruction attacks in split learning.

Neural networks : the official journal of the International Neural Network Society
Due to the distinctive distributed privacy-preserving architecture, split learning has found widespread application in scenarios where computational resources on the client side are limited. Unlike clients in federated learning retaining the whole mo...

DKiS: Decay weight invertible image steganography with private key.

Neural networks : the official journal of the International Neural Network Society
Image steganography, defined as the practice of concealing information within another image. In this paper, we propose decay weight invertible image steganography with private key (DKiS). This model introduces two major advancements into current inve...

Reimbursement and Regulatory Landscape for Artificial Intelligence in Medical Technology.

Gastrointestinal endoscopy clinics of North America
Integration of artificial intelligence (AI) into medical devices and services promises significant improvements in the diagnosis and treatment of disease. This article reviews current payment pathways for AI medical technology and the regulatory issu...

An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security.

Scientific reports
In recent times, there has been rapid growth of technologies that have enabled smart infrastructures-IoT-powered smart grids, cities, and healthcare systems. But these resource-constrained IoT devices cannot be protected by existing security mechanis...