4.7 Article

A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Multi-level feature fusion for multimodal human activity recognition in Internet of Healthcare Things

Md. Milon Islam et al.

Summary: Human Activity Recognition (HAR) is crucial for smart healthcare applications. Existing frameworks dealing with single modality of data lead to decreased reliability and accuracy. This article proposes a multi-level feature fusion technique using multi-head CNN with CBAM for visual data and ConvLSTM for time-sensitive multi-source sensor information. Experimental results show that the developed HAR framework outperforms existing methods.

INFORMATION FUSION (2023)

Article Engineering, Biomedical

Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization

Ilhan Firat Kilincer et al.

Summary: The widespread use of interconnected healthcare equipment and networks in the Internet of Medical Things (IoMT) increases the risk of security compromise. This study presents a cyber-attack and anomaly detection model based on recursive feature elimination (RFE) and multilayer perceptron (MLP). The model achieved high accuracy rates when tested on various IoMT cybersecurity datasets, demonstrating its effectiveness in countering cyber attacks in healthcare applications.

BIOCYBERNETICS AND BIOMEDICAL ENGINEERING (2023)

Article Computer Science, Artificial Intelligence

Privacy protection in intelligent vehicle networking: A novel federated learning algorithm based on information fusion

Zhiguo Qu et al.

Summary: This paper proposes a novel personalized federated learning algorithm based on information fusion to solve the problem of information fusion and sharing in intelligent vehicle networking. The algorithm achieves personalized privacy protection by grading users' privacy based on their preferences and adding noise that satisfies their privacy preferences. It performs collaborative training of deep models among different in-vehicle terminals using a lightweight dynamic convolutional network architecture to generate personalized models. By keeping the last layer local instead of sharing all model parameters, it adds another layer of data confidentiality and makes it difficult for adversaries to infer the target vehicle terminal's image.

INFORMATION FUSION (2023)

Review Computer Science, Hardware & Architecture

Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML

Raihan Ur Rasool et al.

Summary: The Internet of Medical Things (IoMT) enhances the scalability, efficiency, reliability, and accuracy of healthcare services, but the resource-constrained nature of these devices makes them vulnerable to security and privacy threats.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2022)

Article Chemistry, Analytical

A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things

Mohammed Amin Almaiah et al.

Summary: The Industrial Internet of Things is becoming increasingly important as it integrates various technologies and applications. To address the security and privacy issues in IIoT networks, a blockchain-based deep-learning framework is proposed, which provides two levels of security and privacy protection.

SENSORS (2022)

Article Computer Science, Information Systems

X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things

Muna Al-Hawawreh et al.

Summary: The Industrial Internet of Things (IIoT) is a high-value target for cyber attacks, and developing security solutions that fit its requirements is challenging due to the lack of accurate data. To address this, we propose X-IIoTID, an intrusion data set for IIoT that includes multi-view features of connectivity protocols, device activities, attack types, and protocols.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems

Wei Liang et al.

Summary: This article proposes a collaborative clustering-characteristic-based data fusion approach for intrusion detection in a Blockchain-based system. By using mathematical and AI models to train and analyze data, it accurately detects abnormal intrusion behavior.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Artificial Intelligence

A comprehensive survey on multimodal medical signals fusion for smart healthcare systems

Ghulam Muhammad et al.

Summary: Smart healthcare integrates technologies like wearables, IoMT, machine learning, and wireless communication to access health records and link resources. The fusion of multimodal medical signals is a key research focus in this field, with recent developments and challenges being explored in the survey of research works from 2014-2020.

INFORMATION FUSION (2021)

Article Automation & Control Systems

Rotated Sphere Haar Wavelet and Deep Contractive Auto-Encoder Network With Fuzzy Gaussian SVM for Pilot's Pupil Center Detection

Edmond Q. Wu et al.

Summary: This paper proposes a new method to solve the challenge of tracking pilot attention by integrating spherical Haar wavelet transform and deep learning methods. The method includes feature learning, spherical Haar wavelet, higher contractive autoencoder, and fuzzy Gaussian support vector machine components. The experimental results show the effectiveness of the model for spherical signal detection.

IEEE TRANSACTIONS ON CYBERNETICS (2021)

Article Chemistry, Analytical

A Framework for Malicious Traffic Detection in IoT Healthcare Environment

Faisal Hussain et al.

Summary: The rapid growth of IoT technology has revolutionized human life but also raised security concerns, especially in areas such as healthcare. Researchers need IoT-specific tools, methods, and datasets to address the security issues posed by IoT devices.

SENSORS (2021)

Article Automation & Control Systems

PDM: Privacy-Aware Deployment of Machine-Learning Applications for Industrial Cyber-Physical Cloud Systems

Xiaolong Xu et al.

Summary: The article introduces a privacy-aware deployment method (PDM) for hosting ML applications in industrial CPCSs to improve implementation performance and resource utility.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning

M. O. Kalinin et al.

Summary: A method for analyzing network traffic based on quantum machine learning is developed, which encodes network traffic into quantum computer terms to detect network attacks, showing superiority over traditional machine learning methods in experiments.

AUTOMATIC CONTROL AND COMPUTER SCIENCES (2021)

Article Computer Science, Information Systems

Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT

Muna Al-Hawawreh et al.

Summary: This paper introduces a targeted ransomware detection model tailored for IIoT systems, utilizing Asynchronous Peer-to-Peer Federated Learning and Deep Learning techniques to effectively detect known and unknown attacks in these systems with their heterogeneous and distributed nature.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Multi-Source Multi-Domain Data Fusion for Cyberattack Detection in Power Systems

Abhijeet Sahu et al.

Summary: This research introduces a mechanism to fuse real-time data from cyber and physical domains to improve situational awareness in power systems. Enhanced situational awareness can lead to reduced false positives in intrusion detection. The study finds that fusion of features from cyber, security, and physical domains can improve detection accuracy.

IEEE ACCESS (2021)

Review Physics, Applied

Variational quantum algorithms

M. Cerezo et al.

Summary: Variational quantum algorithms, utilizing classical optimizers to train parameterized quantum circuits, have emerged as a leading strategy to address the limitations of quantum computing. Despite challenges, they appear to be the best hope for achieving quantum advantage.

NATURE REVIEWS PHYSICS (2021)

Article Computer Science, Information Systems

Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems

Aliya Tabassum et al.

Summary: The study introduces a novel privacy-preserving intrusion detection pipeline for distributed incremental learning, which eliminates redundant features through innovative extraction techniques and autoencoders. Experimental results demonstrate promising outcomes.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

A privacy-preserving approach to prevent feature disclosure in an IoT scenario

Serena Nicolazzo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study

Anar A. Hady et al.

IEEE ACCESS (2020)

Article Optics

Circuit-centric quantum classifiers

Maria Schuld et al.

PHYSICAL REVIEW A (2020)

Article Computer Science, Artificial Intelligence

A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks

Saurabh Dey et al.

INFORMATION FUSION (2019)

Article Computer Science, Artificial Intelligence

A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion

Wenxiu Ding et al.

INFORMATION FUSION (2019)

Article Computer Science, Information Systems

Cloud-Supported Cyber-Physical Localization Framework for Patients Monitoring

M. Shamim Hossain

IEEE SYSTEMS JOURNAL (2017)

Review Computer Science, Artificial Intelligence

Multisensor data fusion: A review of the state-of-the-art

Bahador Khaleghi et al.

INFORMATION FUSION (2013)

Article Computer Science, Hardware & Architecture

Intrusion detection systems and multisensor data fusion

T Bass

COMMUNICATIONS OF THE ACM (2000)