Mitigating semantic label divergence in federated learning: Obfuscated encoding and alert filtering for security monitoring. [PDF]
Lee Y, Im J, Kim J, Yoon M.
europepmc +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
HashWave: blockchain-powered perceptual hashing for resilient audio piracy detection against signal-processing attacks in decentralized networks. [PDF]
Pandey S +3 more
europepmc +1 more source
Abstract Computed tomography (CT) images are often severely corrupted by artifacts in the presence of metals. Existing supervised metal artifact reduction (MAR) approaches suffer from performance instability on known data due to their reliance on limited paired metal‐clean data, which limits their clinical applicability. Moreover, existing unsupervised
Jie Wen +3 more
wiley +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source
Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework. [PDF]
Chakravarthy DG +3 more
europepmc +1 more source
ABSTRACT Purpose To develop a self‐supervised scan‐specific deep learning framework for reconstructing accelerated multiparametric quantitative MRI (qMRI). Methods We propose REFINE‐MORE (REference‐Free Implicit NEural representation with MOdel REinforcement), combining an implicit neural representation (INR) architecture with a model reinforcement ...
Ruimin Feng +3 more
wiley +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
The Development of Temporal Memory for Complex Events
ABSTRACT Remembering when past events occurred is a key component of episodic memory, yet its developmental trajectory remains only partially understood. This study examined how children aged 6 and 10, compared to young adults, recall the timing of events embedded in an 11‐min cartoon.
Matteo Frisoni +4 more
wiley +1 more source

