Results 91 to 100 of about 36,419 (228)
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad +6 more
wiley +1 more source
Robust Network Traffic Classification Based on Information Bottleneck Neural Network
Network Traffic Classification (NTC) plays a critical role in modern network security and management, used in various applications such as performance monitoring, anomaly detection, and bandwidth management.
Wei Lin, Yu Chen
doaj +1 more source
Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool +7 more
wiley +1 more source
ABSTRACT Background The preschool years (ages 3–5) represent a critical window for promoting development and lifelong health. However, in many low‐resource settings, developmental delays, sensory impairments and emerging health risks often go undetected.
Robyn Smith +12 more
wiley +1 more source
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Privacy-Driven Webpage Fingerprinting Using Encrypted Traffic Packet Lengths
Despite using encryption protocols such as HTTPS, web page fingerprinting poses significant privacy risks, even when traffic analysis is used to identify specific web pages visited by users.
Sahlah Abd Ali, Ielaf Osamah Abdulmajeed
doaj +1 more source
Survey of industrial Internet traffic analysis technology
To gain an in-depth awareness of the application of traffic analysis technology in the industrial Internet, the differences between the industrial Internet and the traditional Internet through the five core traffic analysis processes were illustrated. By
LIU Qixu +7 more
doaj +2 more sources
Privacy protection method for ADS-B air traffic control data based on convolutional neural network and symmetric encryption. [PDF]
Ma C, Jia R, Lou J, Wang M.
europepmc +1 more source
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
Haizhen Wang, Jinying Yan, Na Jia
semanticscholar +1 more source
A privacy preserving intrusion detection framework for IIoT in 6G networks using homomorphic encryption and graph neural networks. [PDF]
Hua B, Xi H.
europepmc +1 more source

