-
121
ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Medical Errors in the Era of Generative AI and Cloud-Based Health Information Ecosystems
Published 2024-07-01“…However, as telehealth technology continues to evolve and Internet of Things (IoT) devices become more widely used, they are also increasingly exposed to various types of vulnerabilities and medical errors. In healthcare information systems, about 90% of vulnerabilities emerge from medical error and human error. …”
Get full text
Article -
122
Análisis observacional del ataque a una pierna del central en el voleibol femenino (Observational analysis of the one-leg attack of the central player in female volleyball)
Published 2024-01-01“…The shot to the diagonal obtained similar results in the points achieved as the shot to the line but with a lower percentage of error. Conclusions: the attack after a positive double reception, the attack at the first half, the shot to the diagonal and the shot "fast" were the actions with which better sports performance was obtained and caused a greater rival defensive disorganization. …”
Get full text
Article -
123
On the Properties of Algebraic Geometric Codes as Copy Protection Codes
Published 2020-03-01“…To prevent this attacks, classes of error-correcting codes with special c-FP and c-TA properties are used. …”
Get full text
Article -
124
Dual-Model Synergy for Fingerprint Spoof Detection Using VGG16 and ResNet50
Published 2025-02-01“…Similarly, the Attack Presentation Classification Error Rate (APCER) remains low at 0.35% on LivDet 2013 and 3.68% on LivDet 2015. …”
Get full text
Article -
125
MSRD-CNN: Multi-Scale Residual Deep CNN for General-Purpose Image Manipulation Detection
Published 2022-01-01“…The experiment results show that our model surpasses the existing schemes even under anti-forensic attacks, when evaluated on large-scale datasets by considering multiple image processing operations. …”
Get full text
Article -
126
An improvement of both security and reliability for AES implementations
Published 2022-11-01“…Cryptographic circuits, because they contain confidential information, are subject to fraudulent manipulations, commonly called attacks, by ill-intentioned people. Several attacks have been identified and analyzed. …”
Get full text
Article -
127
Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism
Published 2024-09-01“…Additionally, this mechanism can synchronize historical query information and privacy budget consumption within the blockchain network to prevent privacy leakage. We employ Relative Error (RE), Mean Square Error (MSE), and privacy budget consumption as evaluation metrics to measure the performance of the proposed mechanism. …”
Get full text
Article -
128
Improved integral neural distinguisher model for lightweight cipher PRESENT
Published 2024-12-01“…The results demonstrate that the key recovery success rates for 5-round and 6-round are 98% and 90%, considering error bits within a range of two bits.…”
Get full text
Article -
129
Framingham Risk Score Prediction at 12 Months in the STANDFIRM Randomized Control Trial
Published 2025-05-01“…Background The STANDFIRM (Shared Team Approach Between Nurses and Doctors for Improved Risk Factor Management; ANZCTR registration ACTRN12608000166370) trial was designed to test the effectiveness of chronic disease care management for modifying the Framingham risk score (FRS) among patients with stroke or transient ischemic attack. The primary outcome of change in FRS was not met. …”
Get full text
Article -
130
DeepLASD countermeasure for logical access audio spoofing
Published 2025-07-01“…Abstract Voice-based authentication systems have become increasingly vulnerable to logical access (LA) spoofing through sophisticated voice conversion (VC) and text-to-speech (TTS) attacks. This paper proposes an end-to-end deep learning approach DeepLASD, that processes raw waveforms to detect spoofed speech without relying on handcrafted features. …”
Get full text
Article -
131
Prediction-Based Distributed State Estimation Control for IoT-Enabled Train Positioning Systems
Published 2025-01-01“…To mitigate the adverse effects of sensor attacks and faults on estimation performance, a novel resilient distributed state estimation method is proposed. …”
Get full text
Article -
132
-
133
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Get full text
Article -
134
Increasing the Efficiency of Blind Decoding of the Steganographic Method with Code Control of Additional Information Embedding
Published 2024-04-01“…This purpose was achieved by identifying two factors that determine the occurrence of errors during blind decoding of additional information in the steganographic method with code control: variation of sub-blocks, and errors caused by attacks against the embedded message. …”
Get full text
Article -
135
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
136
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
137
Adversarial defense for battery state-of-health prediction models
Published 2025-06-01“…To enhance model robustness, we propose a two-defense strategy against such attacks. The effectiveness of these defenses is evaluated using error metrics such as root-mean-square error (RMSE), mean absolute error (MAE), and mean-square error (MSE). …”
Get full text
Article -
138
Position related lightweight Sybil detection approach in VANET
Published 2017-04-01“…In VANET,the Sybil attack simultaneously using multiple forged identities can easily cause the injustice of resource usage and make networks in a mess by distributing false messages.To solve this problem,an event-driven lightweight algorithm was proposed,which could identify vehicles false position quickly.When one vehicle appeared inside another's safety zone,a geometrical cross-recognition algorithm to calculate the overlap between vehicles to detect false position claiming was presented.At the same time,according to the neighbors within the confirming vehicle's radio range,position deviation matrix was established further to identify the Sybil node of two overlap vehicles.The performance analysis and simulation results show that the lightweight algorithm driven by safety zone demonstrates fast identification and high detection rate,especially when GPS error is very low.The imported safety zone can also balance the communication load impacting by heavy vehicular density.And the communication processing delay is lower than other approaches.…”
Get full text
Article -
139
Modular Neural Network Model for Biometric Authentication of Personnel in Critical Infrastructure Facilities Based on Facial Images
Published 2025-02-01“…The experimental results show that the proposed model allows for a 5–10% decrease in person recognition error, recognition of spoofing attacks based on the naturalness of emotions and images of background objects, and recognition of the emotional state of personnel, which increases the efficiency of biometric authentication tools.…”
Get full text
Article -
140
Closing the gap: an urgent need for newborn screening of organic acid disorders in developing countries
Published 2024-05-01Get full text
Article