Results 41 to 50 of about 6,455 (149)

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

Data Sharing and Information Security Under the Software‐Defined Network

open access: yesIET Networks, Accepted Article.
To sum up, the big data sharing platform based on SDN can quickly and effectively respond to the data requests of end users, and the information security protection system can detect the platform in real time to prevent it from being intruded and damaged, which largely protects the information security of the platform." cd_value_code="text Abstract ...
Jianqiao Sheng   +5 more
wiley   +1 more source

Climatic–Anthropogenic Synergy Drives Escalating Minimum Area Requirements and Connectivity‐Protection Mismatch in a Karst‐Endemic Primate

open access: yesIntegrative Zoology, EarlyView.
Climate change and anthropogenic activities drive antagonistic degradation of landscape connectivity for endangered François’ langur (1987–2024), causing 48.8% habitat loss, north‐south fragmentation, and centroid migration (1.2 km/yr). Despite protected areas buffering connectivity, static management fails dynamic priority habitats; we propose ...
Guangmei Yang   +5 more
wiley   +1 more source

Buyer‐Optimal Platform Design

open access: yesThe RAND Journal of Economics, EarlyView.
ABSTRACT A platform matches a unit mass of sellers, each owning a single product of heterogeneous quality, to a unit mass of buyers with differing valuations for unit‐quality. After matching, sellers make take‐it‐or‐leave‐it price‐offers to buyers. Initially, valuations of buyers are only known to them and the platform, but sellers make inferences from
Daniele Condorelli, Balazs Szentes
wiley   +1 more source

Securing Democracy: Online Political Advertising Regulations and Practices in the EU and its Member States

open access: yesGlobal Policy, EarlyView.
ABSTRACT Starting with the Facebook‐Cambridge Analytica scandal and its link to Brexit and the 2016 US elections, the nexus among online political advertising, micro‐targeting, and data‐driven electoral campaigning has revealed its disruptive potential for democracies.
Enea Fiore   +2 more
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Current gynaecological management of women and girls with bleeding disorders in the United Kingdom: A UKHCDO haemophilia treatment centre survey and evaluation of real‐world clinical practice for the British Journal of Haematology

open access: yesBritish Journal of Haematology, EarlyView.
Summary Girls and women with bleeding disorders (GWBD) comprise more than half of all registered patients with bleeding disorders in the UK National Haemophilia Database. The gynaecological care of GWBD, until recently, has not been prioritised despite high health burdens, where four of every five patients experience heavy menstrual bleeding (HMB).
Laura Knox   +17 more
wiley   +1 more source

The state of modelling face processing in humans with deep learning

open access: yesBritish Journal of Psychology, EarlyView.
Abstract Deep learning models trained for facial recognition now surpass the highest performing human participants. Recent evidence suggests that they also model some qualitative aspects of face processing in humans. This review compares the current understanding of deep learning models with psychological models of the face processing system ...
P. Jonathon Phillips, David White
wiley   +1 more source

Home - About - Disclaimer - Privacy