3.8 Article

Cybersecurity and privacy in smart bioprinting

Related references

Note: Only part of the references are listed.
Review Biotechnology & Applied Microbiology

An outlook on the current challenges and opportunities in DNA data storage

Muhammad Hassan Raza et al.

Summary: DNA as an alternative information storage material has gained momentum due to its higher storage capacity, data retention, and lower operational energy compared to silicon-based data storage systems.

BIOTECHNOLOGY ADVANCES (2023)

Article Engineering, Manufacturing

Physics-based and data-driven modeling for biomanufacturing 4.0

Michael Ogunsanya et al.

Summary: Bioprinting is a promising technology in regenerative medicine for fabricating functional tissue constructs using biomaterials. However, it faces challenges due to its sensitivity to process parameters, material constituents, and microenvironmental conditions. This research integrates physics-based and data-driven models to predict bioprinting process parameters in real-time using a hybrid approach with an LSTM network.

MANUFACTURING LETTERS (2023)

Article Biochemistry & Molecular Biology

Nanoscale Topographical Effects on the Adsorption Behavior of Bone Morphogenetic Protein-2 on Graphite

Izabele Marquetti et al.

Summary: The interaction between bone morphogenetic protein-2 (BMP-2) and the surface of biomaterials is crucial for bone and cartilage tissue restoration. This study used simulations to investigate how nanopatterned surfaces affect the interaction between BMP-2 and graphite material, revealing the importance of surface topology features in protein conformation and adsorption.

INTERNATIONAL JOURNAL OF MOLECULAR SCIENCES (2022)

Article Computer Science, Hardware & Architecture

A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets

Bushra Alhijawi et al.

Summary: This article reviews and classifies the research efforts on Software-Defined Networking (SDN) and Denial of Service (DoS) attacks. It presents solutions to cope with DoS attacks on SDN and SDN-based solutions to tackle DoS attacks on networks, and provides a detailed comparison among these approaches.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Information Systems

Cloud computing security: A survey of service-based models

Fatemeh Khoda Parast et al.

Summary: Cloud computing has gained significant attention due to its economical and high-quality services, but security remains a top challenge.

COMPUTERS & SECURITY (2022)

Article Automation & Control Systems

A digital twin ecosystem for additive manufacturing using a real-time development platform

Minas Pantelidakis et al.

Summary: This research presents a novel digital twin ecosystem for additive manufacturing, which enables testing, process monitoring, and remote management. The system utilizes data-driven approaches to achieve accurate synchronization between physical and virtual 3D printers, and has been validated in terms of position, temperature, and run duration. The technology is cost-efficient, reliable, and replicable.

INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY (2022)

Review Computer Science, Hardware & Architecture

Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey

Shah Zeb et al.

Summary: By integrating communication and control technologies, computing and data analytics techniques, and modular manufacturing, Industry 4.0 promotes the integration of cyber-physical worlds through cyber-physical systems and digital twin. Digital twin plays a significant role in simulating, analyzing, and controlling real-time operations in smart industries. However, there is a lack of research on the role and requirements of these technologies in DT-enabled industries from the communication and computing perspective.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2022)

Article Computer Science, Information Systems

DeepSecure: Detection of Distributed Denial of Service Attacks on 5G Network Slicing-Deep Learning Approach

Noble Arden Elorm Kuadey et al.

Summary: Network slicing is a key enabler of 5G cellular networks, but is vulnerable to security threats like DDoS attacks. Recent studies have limitations related to defining thresholds, feature engineering constraints, and computational overload. The proposed DeepSecure framework, based on deep learning techniques, outperforms existing methods in detecting DDoS attacks and predicting appropriate slices for legitimate UE requests.

IEEE WIRELESS COMMUNICATIONS LETTERS (2022)

Article Computer Science, Information Systems

OpenIaC: open infrastructure as code-the network is my computer

Chunming Rong et al.

Summary: A comprehensive approach is needed to create and operate modern information systems by re-imagining current practices. Emerging cloud computing techniques and blockchain advancements offer possibilities to address the needs of modern information architectures. We propose Open Infrastructure as Code (OpenIaC) method to provide services based on Zero Trust Architecture and Decentralized Identity, aiming to build an open and connected resource infrastructure.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2022)

Article Computer Science, Theory & Methods

Query-based black-box attack against medical image segmentation model

Siyuan Li et al.

Summary: Adversarial attacks have gained more attention with the widespread use of deep learning, but existing research primarily focuses on image classification rather than more practical tasks like segmentation. This work introduces a query-based black-box attack that effectively targets medical image segmentation models.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Chemistry, Multidisciplinary

Smart Agent System for Cyber Nano-Manufacturing in Industry 4.0

Naif Almakayeel et al.

Summary: This research provides a unique cyber nanomanufacturing framework by combining digital design with various artificial neural networks (ANN) approaches to predict the optimal nano/micro-manufacturing process in real-time. It establishes a foundation for real-time smart nanomanufacturing with predictive capabilities.

APPLIED SCIENCES-BASEL (2022)

Proceedings Paper Computer Science, Information Systems

Improving the Privacy of Tor Onion Services

Edward Eaton et al.

Summary: In this paper, a new class of attacks against current onion services is presented, which can track the usage of certain services through malicious HSDirs. To restore the unlinkability of these services, concrete designs using Private Information Retrieval (PIR) to hide service information are proposed. The study analyzes the performance, security, and feasibility of three major classes of PIR schemes in the context of Tor, and provides implementations and end-to-end integration suggestions.

APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022 (2022)

Article Computer Science, Information Systems

Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey

Hossein Pirayesh et al.

Summary: This article surveys existing jamming attacks and anti-jamming strategies in various wireless networks, aiming to provide a comprehensive understanding of the current landscape and stimulate further research efforts to secure wireless networks against jamming attacks.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Chemistry, Physical

An Atomistic Investigation of Adsorption of Bone Morphogenetic Protein-2 on Gold with Nanoscale Topographies

Izabele Marquetti et al.

Summary: This research provides new insights into the atomistic adsorption of bone morphogenetic protein (BMP-2) on nanoscale topographies of a gold substrate, with applications in biomedical implants and regenerative medicine. The deep linear-grating substrate showed the most stable adsorption behavior and highest adsorption energy, indicating its preferred nanoscale pattern choice among the substrates considered.

SURFACES (2022)

Proceedings Paper Materials Science, Multidisciplinary

Blockchain in additive manufacturing processes: Recent trends & its future possibilities

Turusha Ghimire et al.

Summary: This article discusses the importance of integrating blockchain technology with additive manufacturing and other new technologies to meet current manufacturing demands. It also provides preliminary guidance for future researchers or organizations looking to integrate blockchain into their supply chain.

MATERIALS TODAY-PROCEEDINGS (2022)

Article History & Philosophy Of Science

Reward tampering problems and solutions in reinforcement learning: a causal influence diagram perspective

Tom Everitt et al.

Summary: This paper investigates when an RL agent has an instrumental goal to tamper with its reward process and presents design principles to prevent instrumental goals for two types of reward tampering.

SYNTHESE (2021)

Article Computer Science, Theory & Methods

A Survey on Bias and Fairness in Machine Learning

Ninareh Mehrabi et al.

Summary: With the widespread use of AI systems in everyday life, fairness in design has become crucial. Researchers have developed methods to address biases in different subdomains and established a taxonomy for fairness definitions. Existing work shows biases in AI applications, and researchers are working on solutions to mitigate these problems.

ACM COMPUTING SURVEYS (2021)

Article Biochemistry & Molecular Biology

Federated learning for predicting clinical outcomes in patients with COVID-19

Ittai Dayan et al.

Summary: Federated learning, a method for training artificial intelligence algorithms while protecting data privacy, was used to predict future oxygen requirements of symptomatic patients with COVID-19 using data from 20 different institutes globally. The study showed improved predictive accuracy and generalizability, setting the stage for wider applications in healthcare.

NATURE MEDICINE (2021)

Review Polymer Science

A Comprehensive Review of Microneedles: Types, Materials, Processes, Characterizations and Applications

Faisal Khaled Aldawood et al.

Summary: Drug delivery through the skin offers advantages such as avoiding hepatic metabolism and maintaining steady plasma concentration, but only a limited number of drugs with ideal properties can achieve therapeutic concentrations. Microneedles are a promising physical enhancement method to expand the spectrum of drugs for transdermal delivery. Different materials used for microneedles have implications for transdermal drug delivery, but challenges in sustained delivery, efficacy, cost-effective fabrication, and large-scale manufacturing remain. Microneedles have potential impact on drug delivery, vaccine delivery, disease diagnostics, and cosmetics applications.

POLYMERS (2021)

Article Computer Science, Artificial Intelligence

Preventing Failures by Dataset Shift Detection in Safety-Critical Graph Applications

Hoseung Song et al.

Summary: Dataset shift refers to the change in input data distribution over time, affecting critical applications such as healthcare and drug-discovery. While existing research has largely focused on image/video data, applications with graph-structured data have not received enough attention. This paper investigates the detection of shifts in graph structured data through statistical hypothesis testing, proposing a flexible approach suitable for large-scale graph data.

FRONTIERS IN ARTIFICIAL INTELLIGENCE (2021)

Review Biology

Preventing dataset shift from breaking machine-learning biomarkers

Jerome Dockes et al.

Summary: Machine learning extracts new biomarkers from cohorts with rich biomedical measurements, but dataset shifts can lead to difficulties in applying these biomarkers to new individuals. Detection and correction strategies are crucial for addressing this issue in biomedical research.

GIGASCIENCE (2021)

Review Computer Science, Information Systems

5G Security Challenges and Solutions: A Review by OSI Layers

S. Sullivan et al.

Summary: 5G envisions a broader range of services but also brings about increased hacker activity, necessitating strong security measures. This paper provides an objective overview of 5G security issues, focusing on vulnerabilities, challenges, and research problems in each OSI layer.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

TrustChain: A Sybil-resistant scalable blockchain

Pim Otte et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Engineering, Industrial

Cyber-based design for additive manufacturing using artificial neural networks for Industry 4.0

Hietam Elhoone et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2020)

Review Engineering, Biomedical

Progress in 3D bioprinting technology for tissue/organ regenerative engineering

Ishita Matai et al.

BIOMATERIALS (2020)

Article Computer Science, Information Systems

A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems

Lalit Chettri et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Multidisciplinary Sciences

Evolution and impact of bias in human and machine learning algorithm interaction

Wenlong Sun et al.

PLOS ONE (2020)

Review Biotechnology & Applied Microbiology

Guidelines for establishing a 3-D printing biofabrication laboratory

Henry W. Sanicola et al.

BIOTECHNOLOGY ADVANCES (2020)

Article Computer Science, Hardware & Architecture

A New 5G eHealth Architecture Based on Optical Camera Communication: An Overview, Prospects, and Applications

Mostafa Zaman Chowdhury et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2020)

Article Computer Science, Information Systems

Security and Privacy in Smart Farming: Challenges and Opportunities

Maanak Gupta et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

Blockchain for Industry 4.0: A Comprehensive Review

Umesh Bodkhe et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Defending Blockchain Forking Attack by Delaying MTC Confirmation

Kaiyu Wang et al.

IEEE ACCESS (2020)

Review Computer Science, Hardware & Architecture

Blockchain in healthcare applications: Research challenges and opportunities

Thomas McGhin et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Review Physics, Applied

Physics of bioprinting

Ashkan Shafiee et al.

APPLIED PHYSICS REVIEWS (2019)

Article Computer Science, Interdisciplinary Applications

Building a digital twin for additive manufacturing through the exploitation of blockchain: A case analysis of the aircraft industry

Claudio Mandolla et al.

COMPUTERS IN INDUSTRY (2019)

Article Computer Science, Information Systems

Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara et al.

IEEE ACCESS (2019)

Article Engineering, Manufacturing

A blockchain enabled Cyber-Physical System architecture for Industry 4.0 manufacturing systems

Jay Lee et al.

MANUFACTURING LETTERS (2019)

Review Pharmacology & Pharmacy

3D bioprinting of tissues and organs for regenerative medicine

Sanjairaj Vijayavenkataraman et al.

ADVANCED DRUG DELIVERY REVIEWS (2018)

Article Automation & Control Systems

Cyber-enabled concurrent material and process selection in a flexible design for manufacture paradigm

S. Desai et al.

INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY (2018)

Article Computer Science, Artificial Intelligence

Wild patterns: Ten years after the rise of adversarial machine learning

Battista Biggio et al.

PATTERN RECOGNITION (2018)

Article Biochemical Research Methods

Cloud computing applications for biomedical science: A perspective

Vivek Navale et al.

PLOS COMPUTATIONAL BIOLOGY (2018)

Review Engineering, Biomedical

3D Bioprinting for Cartilage and Osteochondral Tissue Engineering

Andrew C. Daly et al.

ADVANCED HEALTHCARE MATERIALS (2017)

Article Computer Science, Interdisciplinary Applications

SaaS enabled admission control for MCMC simulation in cloud computing infrastructures

J. L. Vazquez-Poletti et al.

COMPUTER PHYSICS COMMUNICATIONS (2017)

Article Automation & Control Systems

Adversarial Feature Selection Against Evasion Attacks

Fei Zhang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2016)

Article Computer Science, Information Systems

5G mobile technology: A survey

Rupendra Nath Mitra et al.

ICT EXPRESS (2015)

Article Multidisciplinary Sciences

Cyber security challenges in Smart Cities: Safety, security and privacy

Adel S. Elmaghraby et al.

JOURNAL OF ADVANCED RESEARCH (2014)

Article Computer Science, Information Systems

An analysis of security issues for cloud computing

Keiko Hashizume et al.

JOURNAL OF INTERNET SERVICES AND APPLICATIONS (2013)

Article Computer Science, Artificial Intelligence

A unifying view on dataset shift in classification

Jose G. Moreno-Torres et al.

PATTERN RECOGNITION (2012)

Review Computer Science, Hardware & Architecture

A survey on security issues in service delivery models of cloud computing

S. Subashini et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)