-
41
Comparative Analysis of VGG16 and ResNet50 Model Performence in Cardiac ECG Image Classification
Published 2025-06-01Get full text
Article -
42
Facial recognition targeted attack algorithm based on multiscale frequency decomposition and meta-learning
Published 2025-02-01“…The meta-learning attack module enabled precise makeup processing, by which the target face's features were embedded into the makeup to create adversarial makeup images. …”
Get full text
Article -
43
FORMAL CONDITIONS OF STEGANOGRAPHIC METHOD’S SUSTAINABILITY TO COMPRESSION ATTACKS AND THEIR IMPLEMENTATION IN NEW STEGANOGRAPHIC ALGORITHM
Published 2013-04-01“…The main mathematical tool is a matrix analysis. As the container is considered a digital image. …”
Get full text
Article -
44
Effective defense against physically embedded backdoor attacks via clustering-based filtering
Published 2025-04-01“…Abstract Backdoor attacks pose a severe threat to the integrity of machine learning models, especially in real-world image classification tasks. …”
Get full text
Article -
45
Detection and classification of hypertensive retinopathy based on retinal image analysis using a deep learning approach
Published 2025-01-01“…The next step is the image analysis process, which involves extracting retinal blood vessels using the Otsu segmentation algorithm. …”
Get full text
Article -
46
Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography
Published 2025-01-01“…Robustness analysis was conducted on various image quality variation scenarios that includes compression level, resolution and noise tolerance. …”
Get full text
Article -
47
A comprehensive survey on secure healthcare data processing with homomorphic encryption: attacks and defenses
Published 2025-04-01“…It demonstrates HE’s versatility in securing electronic health records (EHRs), enabling privacy-preserving genomic data analysis, protecting medical imaging, facilitating privacy-preserving machine learning (ML), supporting secure federated learning, ensuring confidentiality in clinical trials, and enhancing remote monitoring and telehealth services. …”
Get full text
Article -
48
-
49
Lightweight Image Encryption Algorithm Using 4D-NDS: Compound Dynamic Diffusion and Single-Round Efficiency
Published 2025-01-01Get full text
Article -
50
Salient object detection dataset with adversarial attacks for genetic programming and neural networksMendeley Data
Published 2024-12-01“…Salient object detection is a research area where deep convolutional neural networks have proven effective but whose trustworthiness represents a significant issue requiring analysis and solutions to hackers' attacks. This dataset is an image repository containing five different image databases to evaluate adversarial robustness by introducing 12 adversarial examples, each leveraging a known adversarial attack or noise perturbation. …”
Get full text
Article -
51
-
52
Distinguishing stroke from transient ischemic attack using plaque characteristics and arterial transit artifacts
Published 2025-03-01“…PurposeWe aimed to investigate the differences in plaque characteristics and hemodynamics in patients with ischemic stroke and transient ischemic attack (TIA), comparing the diagnostic abilities of high-resolution magnetic resonance imaging (HRMRI) and arterial spin labeling (ASL) for ischemic stroke.MethodsThis retrospective analysis included patients who underwent HRMRI and ASL between October 2020 and December 2023. …”
Get full text
Article -
53
An image encryption scheme using 4-D chaotic system and cellular automaton
Published 2025-06-01Get full text
Article -
54
Three-Dimensional Image Analysis and Training Method of Action Characteristics of Sanda Whip Leg Technique Based on Wavelet Transform
Published 2022-01-01“…Based on this, this paper attempts to use the three-dimensional image analysis system and surface electromyography acquisition system from the perspective of wavelet transform to collect the speed of the attacking leg movement and the parameters related to muscle discharge and to quantitatively analyze and evaluate its movements. …”
Get full text
Article -
55
-
56
-
57
Artificial Intelligence on Journalism: Algorithmic Power Targeting the Crack in Memory in the Example of ‘Religious Wave’ Terrorist Attacks
Published 2024-11-01“…In this study, which aims to point out the risks of AI news in the context of memory distortion, the ‘religious wave’ terrorist attacks are taken into consideration. Critical discourse analysis was used in this research conducted on a sample of the ChatGPT’s news regarding 9/11, 7/7, 2015 Paris and Christchurch attacks. …”
Get full text
Article -
58
Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection
Published 2025-03-01“…The hybrid model was tested and evaluated based on open-source Sunburst attacks. The results demonstrate the effectiveness and robustness of the suggested hybrid DNN model. …”
Get full text
Article -
59
Multiple color images security by SPN over the residue classes of Gaussian integer $$\:Z{\left[i\right]}_{h}$$
Published 2025-02-01“…The analysis of outcomes proves the efficiency of the developed method; the viability of its application for multi-image encryption with high entropy, low correlation and increased resistance to a variety of attacks. …”
Get full text
Article -
60
A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD
Published 2016-01-01“…To investigate the robustness of the scheme several attacks are applied to seriously distort the watermarked image. …”
Get full text
Article