AIMC Topic: Computer Security

Clear Filters Showing 61 to 70 of 380 articles

Methodology for Safe and Secure AI in Diabetes Management.

Journal of diabetes science and technology
The use of artificial intelligence (AI) in diabetes management is emerging as a promising solution to improve the monitoring and personalization of therapies. However, the integration of such technologies in the clinical setting poses significant cha...

DDP-DAR: Network intrusion detection based on denoising diffusion probabilistic model and dual-attention residual network.

Neural networks : the official journal of the International Neural Network Society
Network intrusion detection (NID) is an effective manner to guarantee the security of cyberspace. However, the scale of normal network traffic is much larger than intrusion traffic (i.e., appearing data imbalance problem), which leads to the training...

Effective DDoS attack detection in software-defined vehicular networks using statistical flow analysis and machine learning.

PloS one
Vehicular Networks (VN) utilizing Software Defined Networking (SDN) have garnered significant attention recently, paralleling the advancements in wireless networks. VN are deployed to optimize traffic flow, enhance the driving experience, and ensure ...

Cluster synchronization of fractional-order two-layer networks and application in image encryption/decryption.

Neural networks : the official journal of the International Neural Network Society
In this paper, a type of fractional-order two-layer network model is constructed, wherein each layer in the network exhibits distinct topology. Subsequently, the cluster synchronization problem of fractional-order two-layer networks is investigated t...

Unlocking Security for Comprehensive Electroencephalogram-Based User Authentication Systems.

Sensors (Basel, Switzerland)
With recent significant advancements in artificial intelligence, the necessity for more reliable recognition systems has rapidly increased to safeguard individual assets. The use of brain signals for authentication has gained substantial interest wit...

FedPD: Defending federated prototype learning against backdoor attacks.

Neural networks : the official journal of the International Neural Network Society
Federated Learning (FL) is an efficient, distributed machine learning paradigm that enables multiple clients to jointly train high-performance deep learning models while maintaining training data locally. However, due to its distributed computing nat...

Advancements in exponential synchronization and encryption techniques: Quaternion-Valued Artificial Neural Networks with two-sided coefficients.

Neural networks : the official journal of the International Neural Network Society
This paper presents cutting-edge advancements in exponential synchronization and encryption techniques, focusing on Quaternion-Valued Artificial Neural Networks (QVANNs) that incorporate two-sided coefficients. The study introduces a novel approach t...

Inclusive AI for radiology: Optimising ChatGPT-4 with advanced prompt engineering.

Clinical imaging
This letter responds to the article "Encouragement vs. liability: How prompt engineering influences ChatGPT-4's radiology exam performance," offering additional perspectives on optimising ChatGPT-4 for Radiology applications. While the study highligh...

Securing healthcare medical image information using advance morphological component analysis, information hiding systems, and hybrid convolutional neural networks on IoMT.

Computers in biology and medicine
Health care images contain a variety of imaging information that has specific features, which can make it challenging to assess and decide on the methods necessitated to safeguard the highly classified visuals from unauthorized exposure during transm...

Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things.

PloS one
With the widespread application of monitoring technology and network storage technology, there are some privacy issues in the process of public service advertising visual design and the process of pushing public service advertising visual design work...