Networking architecture and key supporting technologies for human digital twin in personalized healthcare: A comprehensive survey

J Chen, C Yi, SD Okegbile, J Cai… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Digital twin (DT), referring to a promising technique to digitally and accurately represent
actual physical entities, has attracted explosive interests from both academia and industry …

Vuldeelocator: a deep learning-based fine-grained vulnerability detector

Z Li, D Zou, S Xu, Z Chen, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automatically detecting software vulnerabilities is an important problem that has attracted
much attention from the academic research community. However, existing vulnerability …

Cyber resilience in healthcare digital twin on lung cancer

J Zhang, L Li, G Lin, D Fang, Y Tai, J Huang - IEEE access, 2020 - ieeexplore.ieee.org
As a key service of the future 6G network, healthcare digital twin is the virtual replica of a
person, which employs Internet of Things (IoT) technologies and AI-powered models to …

A systematic review of artificial intelligence and machine learning techniques for cyber security

R Ali, A Ali, F Iqbal, AM Khattak, S Aleem - Big Data and Security: First …, 2020 - Springer
The use of technologies, procedures, and practices, designed to protect networks, programs,
and data from attacks, damages, or unauthorized access, are called cyber security …

BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention

Y Wang, P Jia, X Peng, C Huang, J Liu - Computers & Security, 2023 - Elsevier
Static detection of security vulnerabilities in binary programs is an important research field in
software supply chain security. However, existing vulnerability detection methods based on …

Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope

ZA Sheikh, Y Singh, PK Singh, KZ Ghafoor - Computer Communications, 2022 - Elsevier
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational
algorithms and physical components and they exist as a result of technological …

Static malware detection using stacked bilstm and gpt-2

D Demırcı, C Acarturk - IEEE Access, 2022 - ieeexplore.ieee.org
In recent years, cyber threats and malicious software attacks have been escalated on
various platforms. Therefore, it has become essential to develop automated machine …

VulANalyzeR: Explainable binary vulnerability detection with multi-task learning and attentional graph convolution

L Li, SHH Ding, Y Tian, BCM Fung, P Charland… - ACM Transactions on …, 2023 - dl.acm.org
Software vulnerabilities have been posing tremendous reliability threats to the general
public as well as critical infrastructures, and there have been many studies aiming to detect …

HAN-BSVD: a hierarchical attention network for binary software vulnerability detection

H Yan, S Luo, L Pan, Y Zhang - Computers & Security, 2021 - Elsevier
Deep learning has shown effectiveness in binary software vulnerability detection due to its
outstanding feature extraction capability independent of human expert experience …

Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring the security of modern cyberphysical devices is the most important task of the
modern world. The reason for this is that such devices can cause not only informational, but …