BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

38 related articles for article (PubMed ID: 38676241)

  • 1. IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT.
    Ohtani T; Yamamoto R; Ohzahata S
    Sensors (Basel); 2024 May; 24(10):. PubMed ID: 38794075
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems.
    Alalhareth M; Hong SC
    Sensors (Basel); 2024 May; 24(11):. PubMed ID: 38894310
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Deep Learning Based Intrusion Detection With Adversaries.
    Wang Z
    IEEE Access; 2018; 6():. PubMed ID: 38882674
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Ensemble technique of intrusion detection for IoT-edge platform.
    Aldaej A; Ullah I; Ahanger TA; Atiquzzaman M
    Sci Rep; 2024 May; 14(1):11703. PubMed ID: 38778085
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Mitigating Accuracy-Robustness Trade-Off Via Balanced Multi-Teacher Adversarial Distillation.
    Zhao S; Wang X; Wei X
    IEEE Trans Pattern Anal Mach Intell; 2024 Jun; PP():. PubMed ID: 38889035
    [TBL] [Abstract][Full Text] [Related]  

  • 6. HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization.
    Liu Z; Xiong X; Li Y; Yu Y; Lu J; Zhang S; Xiong F
    Neural Netw; 2024 Jun; 178():106461. PubMed ID: 38906054
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Revisiting the Trade-Off Between Accuracy and Robustness Via Weight Distribution of Filters.
    Wei X; Zhao S; Li B
    IEEE Trans Pattern Anal Mach Intell; 2024 Jun; PP():. PubMed ID: 38848237
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management.
    Luo P; Wang B; Tian J; Liu C; Yang Y
    Sensors (Basel); 2024 Jun; 24(11):. PubMed ID: 38894375
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems.
    Bouke MA; Abdullah A; Cengiz K; Akleylek S
    PeerJ Comput Sci; 2024; 10():e2043. PubMed ID: 38855244
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Self-supervised Adversarial Training of Monocular Depth Estimation against Physical-World Attacks.
    Cheng Z; Han C; Liang J; Wang Q; Zhang X; Liu D
    IEEE Trans Pattern Anal Mach Intell; 2024 Jun; PP():. PubMed ID: 38885107
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Adversarial Infrared Curves: An attack on infrared pedestrian detectors in the physical world.
    Hu C; Shi W; Yao W; Jiang T; Tian L; Chen X; Li W
    Neural Netw; 2024 Jun; 178():106459. PubMed ID: 38901098
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Adversarial attacks against supervised machine learning based network intrusion detection systems.
    Alshahrani E; Alghazzawi D; Alotaibi R; Rabie O
    PLoS One; 2022; 17(10):e0275971. PubMed ID: 36240162
    [TBL] [Abstract][Full Text] [Related]  

  • 13. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.
    Aldhaheri S; Alhuzali A
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37765852
    [TBL] [Abstract][Full Text] [Related]  

  • 14. IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses.
    Albulayhi K; Smadi AA; Sheldon FT; Abercrombie RK
    Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640752
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends.
    Rafique SH; Abdallah A; Musa NS; Murugan T
    Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38544231
    [TBL] [Abstract][Full Text] [Related]  

  • 16. RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic.
    Alkadi S; Al-Ahmadi S; Ben Ismail MM
    Sensors (Basel); 2024 Apr; 24(8):. PubMed ID: 38676241
    [TBL] [Abstract][Full Text] [Related]  

  • 17. EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT.
    Li S; Wang J; Wang Y; Zhou G; Zhao Y
    Heliyon; 2023 Feb; 9(2):e13520. PubMed ID: 36846700
    [TBL] [Abstract][Full Text] [Related]  

  • 18.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 19.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 2.