EHRAgent: Code Empowers Large Language Models for Few-shot Complex Tabular Reasoning on Electronic Health Records. [PDF]
Shi W +9 more
europepmc +1 more source
Securing web applications against XSS and SQLi attacks using a novel deep learning approach. [PDF]
Tadhani JR +4 more
europepmc +1 more source
Tear fluid database: a reference website for tear fluid proteomics. [PDF]
Mayernik D +9 more
europepmc +1 more source
Blockchain-based zero trust networks with federated transfer learning for IoT security in industry 5.0. [PDF]
Sharma A, Rani S, Boulila W.
europepmc +1 more source
Treatment patterns and long-term outcomes in anti-VEGF-treated macular oedema secondary to retinal vein occlusion: a retrospective observational study. [PDF]
Dinah C +12 more
europepmc +1 more source
Mitigating adversarial manipulation in LLMs: a prompt-based approach to counter Jailbreak attacks (Prompt-G). [PDF]
Pingua B +6 more
europepmc +1 more source
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction. [PDF]
Hussain S +6 more
europepmc +1 more source
An IoT intrusion detection framework based on feature selection and large language models fine-tuning. [PDF]
Ma H, Zhang W, Zhang D, Chen B.
europepmc +1 more source
A generative AI cybersecurity risks mitigation model for code generation: using ANN-ISM hybrid approach. [PDF]
Al-Hashimi HA.
europepmc +1 more source
(H-DIR)<sup>2</sup>: A Scalable Entropy-Based Framework for Anomaly Detection and Cybersecurity in Cloud IoT Data Centers. [PDF]
Tosi D, Pazzi R.
europepmc +1 more source

