[HTML][HTML] Sensitivity of machine learning approaches to fake and untrusted data in healthcare domain

F Marulli, S Marrone, L Verde - Journal of Sensor and Actuator Networks, 2022 - mdpi.com
Machine Learning models are susceptible to attacks, such as noise, privacy invasion, replay,
false data injection, and evasion attacks, which affect their reliability and trustworthiness …

Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review

T Ali, A Eleyan, T Bejaoui - 2023 International Symposium on …, 2023 - ieeexplore.ieee.org
Significant progress has been made towards developing Deep Learning (DL) in Artificial
Intelligence (AI) models that can make independent decisions. However, this progress has …

Adversarial machine learning in e-health: attacking a smart prescription system

S Gaglio, A Giammanco, G Lo Re, M Morana - International Conference of …, 2021 - Springer
Abstract Machine learning (ML) algorithms are the basis of many services we rely on in our
everyday life. For this reason, a new research line has recently emerged with the aim of …

[PDF][PDF] A trusted medical data sharing framework for edge computing leveraging blockchain and outsourced computation

G Quan, Z Yao, L Chen, Y Fang, W Zhu, X Si, M Li - Heliyon, 2023 - cell.com
Traditional cloud-centric approaches to medical data sharing pose risks related to real-time
performance, security, and stability. Medical and healthcare data encounter challenges like …

Analysis of the impact of white box adversarial attacks in resnet while classifying retinal fundus images

DP Bharath Kumar, N Kumar, SD Dunston… - … Intelligence in Data …, 2022 - Springer
Medical image analysis with deep learning techniques has been widely recognized to
provide support in medical diagnosis. Among the several attacks on the deep learning (DL) …

AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks

F Concone, S Gaglio, A Giammanco, GL Re… - ACM Transactions on …, 2024 - dl.acm.org
In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT
systems has driven researchers to investigate the security and reliability of ML techniques. A …

Detection of attacks in smart healthcare deploying machine learning algorithms

A Sharma, H Babbar, AK Vats - 2023 4th International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a sort of network that uses a set of protocols and data-sensing
tools to link anything to the Internet. This type of network allows for data exchange as well as …

[PDF][PDF] Predicting facility-based delivery in Zanzibar: The vulnerability of machine learning algorithms to adversarial attacks

YT Tsai, IR Fulcher, T Li, F Sukums, B Hedt-Gauthier - Heliyon, 2023 - cell.com
Background Community health worker (CHW)-led maternal health programs have
contributed to increased facility-based deliveries and decreased maternal mortality in sub …

[HTML][HTML] Trustworthy machine learning in the context of security and privacy

R Upreti, PG Lind, A Elmokashfi, A Yazidi - International Journal of …, 2024 - Springer
Artificial intelligence-based algorithms are widely adopted in critical applications such as
healthcare and autonomous vehicles. Mitigating the security and privacy issues of AI …

Knowledge distillation vulnerability of DeiT through CNN adversarial attack

I Hong, C Choi - Neural Computing and Applications, 2023 - Springer
In the field of computer vision, active research is conducted to improve model performance.
The successful application of transformer models in computer vision has led to the …