These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

122 related articles for article (PubMed ID: 34204726)

  • 1. Deep Reinforcement Learning for Attacking Wireless Sensor Networks.
    Parras J; Hüttenrauch M; Zazo S; Neumann G
    Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34204726
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks.
    Feng J; Zhang M; Xiao Y; Yue H
    Sensors (Basel); 2018 Jan; 18(2):. PubMed ID: 29382061
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Jamming attack against remote state estimation over multiple wireless channels: A reinforcement learning based game theoretical approach.
    Xue L; Ma B; Liu J; Yu Y
    ISA Trans; 2022 Nov; 130():1-9. PubMed ID: 35341584
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Mutual Authentication Framework for Wireless Medical Sensor Networks.
    Srinivas J; Mishra D; Mukhopadhyay S
    J Med Syst; 2017 May; 41(5):80. PubMed ID: 28364358
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Simulation of Attacks for Security in Wireless Sensor Network.
    Diaz A; Sanchez P
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security Enhancement for Deep Reinforcement Learning-Based Strategy in Energy-Efficient Wireless Sensor Networks.
    Hu L; Han C; Wang X; Zhu H; Ouyang J
    Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38544256
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review.
    Mohsin AH; Zaidan AA; Zaidan BB; Albahri AS; Albahri OS; Alsalem MA; Mohammed KI
    J Med Syst; 2018 Oct; 42(12):238. PubMed ID: 30327939
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
    Ni Z; Paul S
    IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
    [TBL] [Abstract][Full Text] [Related]  

  • 9. AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats.
    Yan G; Li Q; Guo D; Li B
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31330986
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Data Division Scheme Based on Homomorphic Encryption in WSNs for Health Care.
    Wang X; Zhang Z
    J Med Syst; 2015 Dec; 39(12):188. PubMed ID: 26490146
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security Attacks and Solutions in Electronic Health (E-health) Systems.
    Zeadally S; Isaac JT; Baig Z
    J Med Syst; 2016 Dec; 40(12):263. PubMed ID: 27730389
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.
    Li X; Chen D; Li C; Wang L
    Sensors (Basel); 2015 Jul; 15(7):15952-73. PubMed ID: 26151208
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cognitive Models in Cybersecurity: Learning From Expert Analysts and Predicting Attacker Behavior.
    Veksler VD; Buchler N; LaFleur CG; Yu MS; Lebiere C; Gonzalez C
    Front Psychol; 2020; 11():1049. PubMed ID: 32612551
    [TBL] [Abstract][Full Text] [Related]  

  • 14. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
    Miller D; Wang Y; Kesidis G
    Neural Comput; 2019 Aug; 31(8):1624-1670. PubMed ID: 31260390
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Learning-Based DoS Attack Power Allocation in Multiprocess Systems.
    Huang M; Ding K; Dey S; Li Y; Shi L
    IEEE Trans Neural Netw Learn Syst; 2023 Oct; 34(10):8017-8030. PubMed ID: 35167483
    [TBL] [Abstract][Full Text] [Related]  

  • 17. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
    He D; Chen C; Chan S; Bu J; Vasilakos AV
    IEEE Trans Inf Technol Biomed; 2012 Jul; 16(4):623-32. PubMed ID: 22531816
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks.
    Liu X; Jin C; Li F
    J Med Syst; 2018 Jun; 42(8):143. PubMed ID: 29959607
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Modular deep reinforcement learning from reward and punishment for robot navigation.
    Wang J; Elfwing S; Uchibe E
    Neural Netw; 2021 Mar; 135():115-126. PubMed ID: 33383526
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Sensor data security level estimation scheme for wireless sensor networks.
    Ramos A; Filho RH
    Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.