Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spen...
详细信息
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spending considerable time conducting the necessary queries;nevertheless, the acquired data is not always related to the sought one, and access may be revoked if this is the case. The exchange and maintenance of medical health records are among the most crucial tasks in the healthcare system. The integrity of health records is crucial, as is maintaining patient anonymity, and either would have devastating effects in the event of a breach. Therefore, it is one of the most important reasons to keep electronic health records safe. Modern healthcare infrastructure is notoriously difficult to use, wasteful, and fraught with problems related to data integrity, security, and privacy. Better EHR management and monitoring, however, has the potential to lessen the severity of the problems with security and complexity. The blockchain's potential, with its decentralized and trustworthy nature in the healthcare industry, makes this a reality. Problems with data management and the way information is validated and disseminated are at the heart of the healthcare delivery system's inherent difficulties. Improved access to medication tracking, hospital assets, drug systems, patient information, and so on is the primary benefit of employing blockchain technology in healthcare data management. Because of how important it is to have access to a patient's medical history when prescribing medication, blockchain technology has the potential to significantly enhance the current healthcare delivery system. Therefore, it is critical to develop a blockchain-based system for verifying and protecting medical records. The primary objective of this article is to create a permissioned blockchain-based Ciphertext Policy-Attribute-based encryption system to protect privacy and regulate acces
Spatial crowdsourcing software are becoming indispensable to modern people's lives. Among all topics over spatial crowdsourcing platforms, pricing method study is a fundamental one. The pricing strategy largely in...
详细信息
With the increasing dimensionality of the data,High-dimensional Feature Selection(HFS)becomes an increasingly dif-ficult *** is not simple to find the best subset of features due to the breadth of the search space and...
详细信息
With the increasing dimensionality of the data,High-dimensional Feature Selection(HFS)becomes an increasingly dif-ficult *** is not simple to find the best subset of features due to the breadth of the search space and the intricacy of the interactions between *** of the Feature Selection(FS)approaches now in use for these problems perform sig-nificantly less well when faced with such intricate situations involving high-dimensional search *** is demonstrated that meta-heuristic algorithms can provide sub-optimal results in an acceptable amount of *** paper presents a new binary Boosted version of the Spider Wasp Optimizer(BSWO)called Binary Boosted SWO(BBSWO),which combines a number of successful and promising strategies,in order to deal with *** shortcomings of the original BSWO,including early convergence,settling into local optimums,limited exploration and exploitation,and lack of population diversity,were addressed by the proposal of this new variant of *** concept of chaos optimization is introduced in BSWO,where initialization is consistently produced by utilizing the properties of sine chaos mapping.A new convergence parameter was then incorporated into BSWO to achieve a promising balance between exploration and *** exploration mechanisms were then applied in conjunction with several exploitation strategies to effectively enrich the search process of BSWO within the search ***,quantum-based optimization was added to enhance the diversity of the search agents in *** proposed BBSWO not only offers the most suitable subset of features located,but it also lessens the data's redundancy *** was evaluated using the k-Nearest Neighbor(k-NN)classifier on 23 HFS problems from the biomedical domain taken from the UCI *** results were compared with those of traditional BSWO and other well-known meta-heuristics-based *** findings indicate that,in comparison to other competing techn
The integrated sensing and communication (ISAC), which enables the same waveform to perform communication and sensing tasks, has increasingly garnered widespread attention in academic and industrial circles. The sidel...
详细信息
Activity hijacking is one of the most powerful attacks in Android. Though promising, all the prior activity hijacking attacks suffer from some limitations and have limited attack capabilities. They no longer pose secu...
详细信息
Activity hijacking is one of the most powerful attacks in Android. Though promising, all the prior activity hijacking attacks suffer from some limitations and have limited attack capabilities. They no longer pose security threats in recent Android due to the presence of effective defense mechanisms. In this work, we propose the first automated and adaptive activity hijacking attack, named VenomAttack, enabling a spectrum of customized attacks (e.g., phishing, spoofing, and DoS) on a large scale in recent Android, even the state-of-the-art defense mechanisms are deployed. Specifically, we propose to use hotpatch techniques to identify vulnerable devices and update attack payload without re-installation and re-distribution, hence bypassing offline detection. We present a newly-discovered flaw in Android and a bug in derivatives of Android, each of which allows us to check if a target app is running in the background or not, by which we can determine the right attack timing via a designed transparent activity. We also propose an automated fake activity generation approach, allowing large-scale attacks. Requiring only the common permission INTERNET, we can hijack activities at the right timing without destroying the GUI integrity of the foreground app. We conduct proof-of-concept attacks, showing that VenomAttack poses severe security risks on recent Android versions. The user study demonstrates the effectiveness of VenomAttack in real-world scenarios, achieving a high success rate (95%) without users’ awareness. That would call more attention to the stakeholders like Google.
Graph Neural Networks (GNNs) have been extensively utilized in the field of traditional Chinese medicine (TCM) herb recommendation. Nevertheless, the current TCM herb recommendation algorithms have not adequately harn...
详细信息
The development of blockchain technology is influenced by user diversity and application scenarios, resulting in limitations on the applicability of assets. Although cloud computing is renowned for faci...
详细信息
Nowadays it has become very difficult to tell the legitimacy of news on social media news blogs and online newspaper. Hence there is a need of tools that can check these sources to identify fake news. The automatic de...
详细信息
Generating realistic handwritten word images that closely resemble a target style remains a challenging task in document image analysis. In recent years, deep learning techniques, such as Latent Diffusion Models (LDM)...
详细信息
The increasing adoption of Electric Vehicles (EVs) necessitates advanced charging infrastructure. This manuscript presents a novel approach that integrates Graph Convolutional Networks (GCNs) and the Deep Dyna Reinfor...
详细信息
暂无评论