Results 71 to 80 of about 37,470 (199)
Large Language Models for Explainable Medical Text Summarization: A Systematic Literature Review
The graphical abstract highlights the three key aspects addressed in this review: the technical background of medical text summarization methods relevant to clinical decision support; the LLM background in providing context for its diagnosis and clinical significance; and clinical decision support with summarization and explainability in patient care ...
Aleka Melese Ayalew +3 more
wiley +1 more source
Advanced GNSS Spoofing Detection: Aggregated Correlation Residue Likelihood Analysis
Compared to conventional spoofing, emerging spoofing attacks pose a heightened threat to security applications within the global navigation satellite system (GNSS) due to their subtly designed signal structures.
Ning Ji +3 more
doaj +1 more source
Constructing Optimal Authentication Codes with Perfect Multi-fold Secrecy
We establish a construction of optimal authentication codes achieving perfect multi-fold secrecy by means of combinatorial designs. This continues the author's work (ISIT 2009) and answers an open question posed therein. As an application, we present the
Huber, Michael
core +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
Detection of Induced GNSS Spoofing Using S-Curve-Bias
In Global Navigation Satellite System (GNSS), a spoofing attack consists of forged signals which possibly cause the attacked receivers to deduce a false position, a false clock, or both.
Wenyi Wang +3 more
doaj +1 more source
Face Spoofing Detection by Fusing Binocular Depth and Spatial Pyramid Coding Micro-Texture Features
Robust features are of vital importance to face spoofing detection, because various situations make feature space extremely complicated to partition. Thus in this paper, two novel and robust features for anti-spoofing are proposed.
Lin, Tianwei, Song, Xiao, Zhao, Xu
core +1 more source
Active digital spoof plasmonics [PDF]
Abstract Digital coding and digital modulation are the foundation of modern information science. The combination of digital technology with metamaterials provides a powerful scheme for spatial and temporal controls of electromagnetic waves. Such a technique, however, has thus far been limited to the control of free-space light.
Zhang, Hao Chi +6 more
openaire +2 more sources
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
GNSS induced spoofing simulation based on path planning
Global navigation satellite Systems (GNSS) are highly susceptible to various interferences because of their inherent vulnerability. In these interferences, induced spoofing is very difficult to be detected because it can gradually drag off the tracking ...
Wenyi Wang, Jinming Wang
doaj +1 more source
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang +3 more
core +1 more source

