Neural networks : the official journal of the International Neural Network Society
39793487
The article discusses an improved memory-event-triggered strategy for H control class of fractional-order neural networks (FONNs) with uncertainties, which are vulnerable to deception attacks. The system under consideration is simultaneously influenc...
Sheng li xue bao : [Acta physiologica Sinica]
39780570
As artificial intelligence technology rapidly advances, its deployment within the medical sector presents substantial ethical challenges. Consequently, it becomes crucial to create a standardized, transparent, and secure framework for processing medi...
Software-Defined Networks (SDN) provides more control and network operation over a network infrastructure as an emerging and revolutionary paradigm in networking. Operating the many network applications and preserving the network services and functio...
In the context of Chinese clinical texts, this paper aims to propose a deep learning algorithm based on Bidirectional Encoder Representation from Transformers (BERT) to identify privacy information and to verify the feasibility of our method for pri...
Anomaly detection is crucial in areas such as financial fraud identification, cybersecurity defense, and health monitoring, as it directly affects the accuracy and security of decision-making. Existing generative adversarial nets (GANs)-based anomaly...
This article examines the transformative potential of blockchain technology and its integration with artificial intelligence (AI) in clinical trials, focusing on their combined ability to enhance integrity, operational efficiency, and transparency in...
Neural networks : the official journal of the International Neural Network Society
39827841
Due to the distinctive distributed privacy-preserving architecture, split learning has found widespread application in scenarios where computational resources on the client side are limited. Unlike clients in federated learning retaining the whole mo...
Neural networks : the official journal of the International Neural Network Society
39827833
Image steganography, defined as the practice of concealing information within another image. In this paper, we propose decay weight invertible image steganography with private key (DKiS). This model introduces two major advancements into current inve...
In the current cybersecurity landscape, Distributed Denial of Service (DDoS) attacks have become a prevalent form of cybercrime. These attacks are relatively easy to execute but can cause significant disruption and damage to targeted systems and netw...
Journal of the American Medical Informatics Association : JAMIA
39836496
BACKGROUND: Generative AI, particularly large language models (LLMs), holds great potential for improving patient care and operational efficiency in healthcare. However, the use of LLMs is complicated by regulatory concerns around data security and p...