The use of artificial intelligence (AI) in healthcare has transformed both operational and patient outcomes in the contemporary period. But with these developments comes the crucial problem of cybersecurity. This stud...
详细信息
ISBN:
(纸本)9798331540661;9798331540678
The use of artificial intelligence (AI) in healthcare has transformed both operational and patient outcomes in the contemporary period. But with these developments comes the crucial problem of cybersecurity. This study explores the relationship between AI-driven technology and cybersecurity in the healthcare industry, with a particular emphasis on patient data and medical device protection. The paper begins by outlining the pivotal role AI plays in healthcare, from enhancing diagnostics to optimizing treatment plans. It then highlights the vulnerabilities that arise as healthcare systems become increasingly interconnected and reliant on AI algorithms. Central to this discussion are the unique cybersecurity challenges posed by AI, such as adversarial attacks and data privacy concerns. Furthermore, the research explores current strategies and technologies employed to safeguard patient data and medical devices. It examines the role of AI itself in bolstering cybersecurity defenses, including anomaly detection and predictive analytics. Case studies and examples from recent cyber incidents highlight the need for addressing these issues comprehensively. Finally, the paper proposes future directions for research and development in AI-driven healthcare cybersecurity.
intelligent attackers targeting critical infrastructure frequently conceal their attack strategies until their objectives are accomplished. Despite extensive research on detecting manipulated data, much of this resear...
详细信息
intelligent transportation systems (ITS) play a critical role in modern urban transportation by improving traffic management and enhancing safety. The emergence of various ITS applications demands that roadside units ...
详细信息
ISBN:
(纸本)9798350386851;9798350386844
intelligent transportation systems (ITS) play a critical role in modern urban transportation by improving traffic management and enhancing safety. The emergence of various ITS applications demands that roadside units (RSUs) be capable of hosting multiple applications simultaneously. This paper introduces an RSU platform designed for simultaneous hosting of multiple ITS applications. It not only reduces the effort of ITS application development but also resolves conflicts in traffic signal control strategies among different applications. Performance results demonstrate that the platform has the capability of handling 1000 on-board units (OBUs), sufficient for an RSU at a single intersection. The platform is currently deployed at 31 intersections in Tainan City, Taiwan, demonstrating its practical feasibility.
As the end of the distribution network closest to the user, the station area is very important to ensure the stability and safety of the station area. But now the station area has more problems in data collection and ...
详细信息
The increasing risk of cyber-physical attacks (CPAs) on power infrastructure has led to need for reliable detection technologies. As the landscape of cyber threats evolves, it becomes imperative to continually update ...
详细信息
ISBN:
(纸本)9798350318562;9798350318555
The increasing risk of cyber-physical attacks (CPAs) on power infrastructure has led to need for reliable detection technologies. As the landscape of cyber threats evolves, it becomes imperative to continually update and enhance attack detection techniques. This research investigates the formulation of detection algorithm, via combination of State Partition Particle Filter (SP-PF) theories for power system security. The proposed approach applies intelligent partitioning of the state space so as to be accurately represented with fewer particles. This reduction in computational demand enhances the algorithm's efficiency, making it more practical for real-time applications. The detection algorithm based on SP-PF is tested against switching attacks (SAs) launched on the governor and excitation systems associated with the generator. The RTDS platform is utilized for conducting real-time simulations of ieee 9-bus power network in order to demonstrate the efficacy of proposed SP-PF based detection SA in real-time.
In this paper, we study the exact reachability of a kind of linear stochastic systems with partial information. The system is described by a class of Itô stochastic differential equation that includes a controlle...
详细信息
ISBN:
(数字)9798331506056
ISBN:
(纸本)9798331506063
In this paper, we study the exact reachability of a kind of linear stochastic systems with partial information. The system is described by a class of Itô stochastic differential equation that includes a controller and two independent multiplicative noises, only one of which is available to design the controller. The main contribution is to derive the necessary and sufficient Gramian criterion for the exact reachability of the system with partial information. In particular, the derived result contains the case with complete information as a special case.
Aiming at the problem that the substation insulator replacement robot cannot accurately identify insulator pins in the complex outdoor light environment, an improved YOLOv5-based insulator pin identification method YO...
详细信息
This research undertakes a comparative examination of the recall performance of Logistic Regression (LR), Random Forest (RF), and Decision Tree (DT) models for intrusion detection systems (IDS). The analysis is conduc...
详细信息
Assist mechanism applied to the lower limbs is an important requirement in the field of sports research and medical rehabilitation. In this paper, we propose a foot-based wearing assist mechanism with metatarsophalang...
详细信息
The rapid development of fifth-generation (5G) mobile communication technology poses fresh challenges for cyber-security defense systems. Current intrusion detection mechanisms in 5G networks have shortcomings, partic...
详细信息
ISBN:
(纸本)9798350375367
The rapid development of fifth-generation (5G) mobile communication technology poses fresh challenges for cyber-security defense systems. Current intrusion detection mechanisms in 5G networks have shortcomings, particularly in identifying sophisticated cyber attacks. Our study presents a novel approach combining Federated Learning with Long Short-Term Memory (LSTM) networks to enhance cyber threat detection on the GTP protocol within 5G infrastructures. Our approach leverages the collective analytical power of multiple devices to identify cyber threats more effectively. The model validated against two major cyber threats, Distributed Packet Forwarding control Protocol (PFCP) and IP address spoofing emulated within a specially constructed 5G test environment that mirrors a complex public network infrastructure. The findings demonstrate that our unsupervised FL-LSTM model effectively identifies 5G cyber threats while preserving individual network traffic privacy, highlighting Federated Learning's potential to strengthen 5G and beyond network security.
暂无评论