Interpretable Medical Imagery Diagnosis with Self-Attentive Transformers: A Review of Explainable AI for Health Care

T Lai - BioMedInformatics, 2024 - mdpi.com
Recent advancements in artificial intelligence (AI) have facilitated its widespread adoption in
primary medical services, addressing the demand–supply imbalance in healthcare. Vision …

SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments

KA Awan, IU Din, A Almogren, A Nawaz, MY Khan… - Heliyon, 2025 - cell.com
The rapid growth of Internet of Things (IoT) devices presents significant cybersecurity
challenges due to their diverse and resource-constrained nature. Existing security solutions …

Improved Radial Movement Optimization With Fuzzy Neural Network Enabled Anomaly Detection for IoT Assisted Smart Cities

FS Alrayes, W Mtouaa, SS Aljameel, M Maashi… - IEEE …, 2023 - ieeexplore.ieee.org
Recently, an extensive implementation of the recent Internet of Things (IoT) model has
resulted in the development of smart cities. The network traffic of smart cities using loT …

[HTML][HTML] A Two-Step Machine Learning Approach for Predictive Maintenance and Anomaly Detection in Environmental Sensor Systems

S Potharaju, RK Tirandasu, SN Tambe, DB Jadhav… - MethodsX, 2025 - Elsevier
Environmental sensor systems are essential for monitoring infrastructure and environmental
quality but are prone to unreliability caused by sensor faults and environmental anomalies …

Enhancing IoT Network Security Using Feature Selection for Intrusion Detection Systems.

M Almohaimeed, F Albalwy - Applied Sciences (2076-3417), 2024 - search.ebscohost.com
Abstract The Internet of Things (IoT) connects people, devices, and processes in multiple
ways, resulting in the rapid transformation of several industries. Apart from several positive …

Interval-Valued Neutrosophic Set with Optimization Algorithm for Cyberthreat Detection and Classification in IoT Infrastructure.

S Thangam, S Jana - International Journal of Neutrosophic …, 2025 - search.ebscohost.com
Neutrosophic Logic is an offspring study region in which every intention is projected to hold
the proportion of indeterminacy in a subset I, the percentage of truth in a subset T, and the …

Scalable IoT Security Framework Leveraging Ensemble Learning for Attestation

TT Mini, S Behera, MS Reddy… - 2024 IEEE 16th …, 2024 - ieeexplore.ieee.org
Attestation involves providing verifiable evidence to support claims about the characteristics
of a target device. Devices that manage sensitive data-such as wearables, Industrial IoT …

Nonlinear Time Series Analysis for Anomaly Detection in Cybersecurity using Cloud IoT

AK Dwivedi - Advances in Nonlinear Variational Inequalities, 2023 - internationalpubls.com
The CloudIoT is an extensive network that hosts several IoT gadgets and apps. This
comprises the servers and the storage space required for real-time processing and …

Access Control Mechanisms and Their Role in Preventing Unauthorized Data Access: A Comparative Analysis of RBAC, MFA, and Strong Passwords

ES Abduhari, TC Shaik, AB Adidul… - Natural Sciences …, 2025 - nasetjournal.com
In today's digital landscape, the protection of sensitive data from unauthorized access is a
critical concern for organizations of all sizes. Robust access control mechanisms are …