过去一年中添加的文章,按日期排序

Decentralized finance and technology readiness

C Sachdeva, VP Gangwar… - Smart Global Value Chain …, 2024 - books.google.com
1 天前 - … Enhanced security measures: DeFi explores decentralized identity solutions,
enhancing the security and privacy of user data. The use of cryptographic principles and …

Revisiting vision-based violence detection in videos: A critical analysis

G Kaur, S Singh - Neurocomputing, 2024 - Elsevier
1 天前 - … , security and asset protection has triggered the need for … : handcrafted features
based, deep learning and hybrid violence … approaches and the possible solutions to be taken to …

Enhancing security and scalability by AI/ML workload optimization in the cloud

S Priyadarshini, TN Sawant, G Bhimrao Yadav… - Cluster …, 2024 - Springer
1 天前 - … of Artificial Intelligence (AI) and Machine Learning (ML) … for enhancing both the
scalability and security of AI/ML workloads … of candidate solutions toward better solutions. Each …

Embedded system security analysis based on machine learning: Challenges, techniques

N Bathla, A Kaur - … Intelligence and Information Technologies, 2025 - taylorfrancis.com
1 天前 - solutions to overcome them. Moreover, it discusses IoT parameters like data volume,
velocity, and variety, emphasizing the role of machine learning in … to enhance security and …

Next-generation intrusion detection systems with LLMs: real-time anomaly detection, explainable AI, and adaptive data generation

T Ali - 2024 - oulurepo.oulu.fi
2 天前 - … This study advances the traditional machine learning … as well as threat intelligence
from external sources [4]. … security solutions that can perform real-time analysis and …

A hybrid optimization approach for securing cloud-based e-health systems

A Altherwi, MT Ahmad, MM Alam, H Mirza… - Multimedia Tools and …, 2024 - Springer
2 天前 - machine learning, optimization algorithms, and intelligent decision-making to enhance
security posture … and deep learning to enhance healthcare services and improve patient …

Diffusion-based Adversarial Purification for Intrusion Detection

M Amine Merzouk, E Beurier, R Yaich… - arXiv e …, 2024 - ui.adsabs.harvard.edu
2 天前 - … The escalating sophistication of cyberattacks has encouraged the integration of
machine learning … As a reaction, adversarial purification has emerged as a compelling solution, …

Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations

NJ Patel, A Jadhav - IET Cyber‐Physical Systems: Theory & …, 2024 - Wiley Online Library
2 天前 - … Q-learning techniques offers a practical solution to evolving … Security measures
should be described in privacy policies … Q-learning is a reinforcement learning algorithm used to …

Performance evaluation of supervised machine learning algorithms for classification in IoT

HK Saini, M Poriye, S Upadhyaya - Artificial Intelligence and …, 2025 - taylorfrancis.com
2 天前 - … Therefore it is necessary to design some security solutions to handle … machine
learning algorithms like Decision Trees (DT), Random Forests (RF), Support Vector Machines (…

The Future of Medical Imaging: Ensuring Ethical and Legal Compliance

S Acharya, P Paul - Smart Medical Imaging for Diagnosis and Treatment … - taylorfrancis.com
2 天前 - … tale is how machine learning and artificial intelligence (AI) … Similar to how financial
companies use strong security … access to critical imaging services. This proactive measure …