Adaptive 4D‐Printed Vascular Stents With Low‐Temperature‐Activated and Intelligent Deployment
Microarchitected coronary artery stents were fabricated using a polycaprolactone (PCL)‐based shape memory polymer (SMP) composite via projection micro‐stereolithography (PµSL) 4D printing. By incorporating diethyl phthalate (DEP) as a plasticizer, the thermal transition temperature (Ttran) was modulated to about 37°C, enabling rapid and autonomous ...
Yannan Li +12 more
wiley +1 more source
Federated learning-powered real-time behavioral intrusion detection leveraging LSTM, attention, GANs, and large language models. [PDF]
AlHayan A, Al-Muhtadi J.
europepmc +1 more source
Privacy-Preserving Hierarchical Fog Federated Learning (PP-HFFL) for IoT Intrusion Detection. [PDF]
Islam MM, Abdullah WM, Saha BN.
europepmc +1 more source
A personalized federated hypernetworks based aggregation approach for intrusion detection systems. [PDF]
Abhijit CS +3 more
europepmc +1 more source
AI-driven intrusion detection and lightweight authentication framework for secure and efficient medical sensor networks. [PDF]
Al-Otaibi S +4 more
europepmc +1 more source
Improved model for intrusion detection in the Internet of Things. [PDF]
Amine MS, Nada FA, Hosny KM.
europepmc +1 more source
Performance Analysis of Explainable Deep Learning-Based Intrusion Detection Systems for IoT Networks: A Systematic Review. [PDF]
Ogunseyi TB +4 more
europepmc +1 more source
Related searches:
Intrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure and trustworthy computing framework.
Thomas M. Chen +3 more
+4 more sources
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source

