Topic Review
Self-Healing in Cyber–Physical Systems Using Machine Learning
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With advancements in automobiles, medical devices, smart industrial systems, and other technologies, system failures resulting from external attacks or internal process malfunctions are increasingly common. Restoring the system’s stable state requires autonomous intervention through the self-healing process to maintain service quality.
  • 225
  • 12 Oct 2023
Topic Review
Detection of Rootkits Using Memory Analysis
Rootkits are malicious programs designed to conceal their activities on compromised systems, making them challenging to detect using conventional methods. As the threat landscape continually evolves, rootkits pose a serious threat by stealthily concealing malicious activities, making their early detection crucial to prevent data breaches and system compromise. A promising strategy for monitoring system activities involves analyzing volatile memory. The process can be made more reliable by the use of Machine learning and deep learning algorithms too.
  • 357
  • 12 Oct 2023
Topic Review
Advanced Persistent Threats Detection for Mobile Devices
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-organized and skilled adversary to remain undetected while systematically and continuously exfiltrating sensitive data. Various APT attack vectors exist, including social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging. Various sensors and services are essential for a smartphone to assist in user behavior that involves sensitive information. Resultantly, smartphones have become the main target of APT attacks.
  • 300
  • 12 Oct 2023
Topic Review
Social Behavioral Biometrics
Social Behavioral Biometrics (SBB) is a novel biometric category. This innovative field of study investigates a person’s social interactions and communication patterns to ascertain their identity. 
  • 312
  • 12 Oct 2023
Topic Review
Relational Cues and Tailoring of e-Coach Dialogues
Relational cues are extracts from actual verbal dialogues that help build the therapist–patient working alliance and stronger bond through the depiction of empathy, respect and openness. ECAs (Embodied conversational agents) are human-like virtual agents that exhibit verbal and non-verbal behaviours. In the digital health space, ECAs act as health coaches or experts.
  • 207
  • 12 Oct 2023
Topic Review
Knowledge Reasoning
A knowledge graph (KG) organizes knowledge as a set of interlinked triples, and a triple ((head entity, relation, tail entity), simply represented as (h, r, t)) indicates the fact that two entities have a certain relation. The availability of formalized and rich structured knowledge has emerged as a valuable resource in facilitating various downstream tasks, such as question answering and recommender systems. Although KGs such as DBpedia, Freebase, and NELL contain large amounts of entities, relations, and triples, they are far from complete, which is an urgent issue for their broad application. To address this, researchers have introduced the concept of knowledge graph completion (KGC), which has garnered increasing interest. It utilizes knowledge reasoning techniques to automatically discover new facts based on existing ones in a KG.
  • 162
  • 12 Oct 2023
Topic Review
Diabetic Retinopathy Lesion Identification and Multiple Instance Learning
Accurate identification of lesions and their use across different medical institutions are the foundation and key to the clinical application of automatic diabetic retinopathy (DR) detection. Existing detection or segmentation methods can achieve acceptable results in DR lesion identification, but they strongly rely on a large number of fine-grained annotations that are not easily accessible and suffer severe performance degradation in the cross-domain application.
  • 249
  • 11 Oct 2023
Topic Review
CAPTCHA Classification
To achieve an acceptable level of security on the web, the Completely Automatic Public Turing test to tell Computer and Human Apart (CAPTCHA) was introduced as a tool to prevent bots from doing destructive actions such as downloading or signing up. Smartphones have small screens, and, therefore, using the common CAPTCHA methods (e.g., text CAPTCHAs) in these devices raises usability issues.
  • 504
  • 11 Oct 2023
Topic Review
Mapping of the NUMA-BTDM Algorithm
Through Low-Level Virtual Machine (LLVM)-compiling infrastructure, one can build just-in-time (JIT) compilers which are used to interpret the LLVM IR (Intermediate Representation) corresponding to new syntactic rules as part of a new programming language invented by the developer. In this case, the LLVM JIT is used to compile the code which is not part of the language definitions of clang (LLVM front end). LLVM JIT can also trigger LLVM optimizations on the LLVM IR. 
  • 264
  • 11 Oct 2023
Topic Review
Oximetry for Obstructive Sleep Apnea
Scoring polysomnography for obstructive sleep apnea diagnosis is a laborious, long, and costly process. Machine learning approaches, such as deep neural networks, can reduce scoring time and costs.
  • 475
  • 11 Oct 2023
  • Page
  • of
  • 371
Video Production Service