Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 6 de 6
Filter
Add more filters










Database
Language
Publication year range
1.
Article in English | MEDLINE | ID: mdl-37018715

ABSTRACT

The Artificial Intelligence-enabled Internet of Medical Things (AI-IoMT) envisions the connectivity of medical devices encompassing advanced computing technologies to empower large-scale intelligent healthcare networks. The AI-IoMT continuously monitors patients' health and vital computations via IoMT sensors with enhanced resource utilization for providing progressive medical care services. However, the security concerns of these autonomous systems against potential threats are still underdeveloped. Since these IoMT sensor networks carry a bulk of sensitive data, they are susceptible to unobservable False Data Injection Attacks (FDIA), thus jeopardizing patients' health. This paper presents a novel threat-defense analysis framework that establishes an experience-driven approach based on a deep deterministic policy gradient to inject false measurements into IoMT sensors, computing vitals, causing patients' health instability. Subsequently, a privacy-preserved and optimized federated intelligent FDIA detector is deployed to detect malicious activity. The proposed method is parallelizable and computationally efficient to work collaboratively in a dynamic domain. Compared to existing techniques, the proposed threat-defense framework is able to thoroughly analyze severe systems' security holes and combats the risk with lower computing cost and high detection accuracy along with preserving the patients' data privacy.

2.
IEEE Trans Neural Netw Learn Syst ; 34(4): 2133-2143, 2023 Apr.
Article in English | MEDLINE | ID: mdl-34473629

ABSTRACT

There has been a recent surge of success in optimizing deep reinforcement learning (DRL) models with neural evolutionary algorithms. This type of method is inspired by biological evolution and uses different genetic operations to evolve neural networks. Previous neural evolutionary algorithms mainly focused on single-objective optimization problems (SOPs). In this article, we present an end-to-end multi-objective neural evolutionary algorithm based on decomposition and dominance (MONEADD) for combinatorial optimization problems. The proposed MONEADD is an end-to-end algorithm that utilizes genetic operations and rewards signals to evolve neural networks for different combinatorial optimization problems without further engineering. To accelerate convergence, a set of nondominated neural networks is maintained based on the notion of dominance and decomposition in each generation. In inference time, the trained model can be directly utilized to solve similar problems efficiently, while the conventional heuristic methods need to learn from scratch for every given test problem. To further enhance the model performance in inference time, three multi-objective search strategies are introduced in this work. Our experimental results clearly show that the proposed MONEADD has a competitive and robust performance on a bi-objective of the classic travel salesman problem (TSP), as well as Knapsack problem up to 200 instances. We also empirically show that the designed MONEADD has good scalability when distributed on multiple graphics processing units (GPUs).

3.
Digit Commun Netw ; 9(2): 393-399, 2023 Apr.
Article in English | MEDLINE | ID: mdl-36405566

ABSTRACT

The COVID-19 pandemic has imposed new challenges on the healthcare industry as hospital staff are exposed to a massive coronavirus load when registering new patients, taking temperatures, and providing care. The Ebola epidemic of 2014 is another example of a pandemic which a hospital in New York decided to use an audio-based communication system to protect nurses. This idea quickly turned into an Internet of Things (IoT) healthcare solution to help to communicate with patients remotely. However, it has grabbed the attention of criminals who use this medium as a cover for secret communication. The merging of signal processing and machine-learning techniques has led to the development of steganalyzers with very higher efficiencies, but since the statistical properties of normal audio files differ from those of purely speech audio files, the current steganalysis practices are not efficient enough for this type of content. This research considers the Percent of Equal Adjacent Samples (PEAS) feature for speech steganalysis. This feature efficiently discriminates the least significant bit stego speech samples from clean ones with a single analysis dimension. A sensitivity of 99.82% was achieved for the steganalysis of 50% embedded stego instances using a classifier based on the Gaussian membership function.

4.
Sensors (Basel) ; 22(22)2022 Nov 21.
Article in English | MEDLINE | ID: mdl-36433618

ABSTRACT

In Wireless Body Area Networks (BAN), energy consumption, energy harvesting, and data communication are the three most important issues. In this paper, we develop an optimal allocation algorithm (OAA) for sensor devices, which are carried by or implanted in human body, harvest energy from their surroundings, and are powered by batteries. Based on the optimal allocation algorithm that uses a two-timescale Lyapunov optimization approach, we design a framework for joint optimization of network service cost and network utility to study energy, communication, and allocation management at the network edge. Then, we formulate the utility maximization problem of network service cost management based on the framework. Specifically, we use OAA, which does not require prior knowledge of energy harvesting to decompose the problem into three subproblems: battery management, data collection amount control and transmission energy consumption control. We solve these through OAA to achieve three main goals: (1) balancing the cost of energy consumption and the cost of data transmission on the premise of minimizing the service cost of the devices; (2) keeping the balance of energy consumption and energy collection under the condition of stable queue; and (3) maximizing network utility of the device. The simulation results show that the proposed algorithm can actually optimize the network performance.


Subject(s)
Physiological Phenomena , Humans , Physical Phenomena , Algorithms , Communication , Computer Simulation
5.
IEEE J Biomed Health Inform ; 26(5): 1961-1968, 2022 05.
Article in English | MEDLINE | ID: mdl-34428168

ABSTRACT

The Internet of Things (IoT) growth is extremely fast and it now has found its way to healthcare applications too. Many smart health gadgets and devices are helping practitioners in collecting medical information and monitoring patients. In this distributed system, information or service is sometimes shared and used by other devices. Considering the importance of health-related information and the decisions made based on it, there should be some sort of assurance on the security and quality of the services or information provided. Trust management is an efficient means of promoting application security and reliability in these cases. However, due to some limitations that are specific to IoT, traditional trust evaluation algorithms cannot be employed or do not yield satisfactory results. In this paper, evidence theory is exploited to design a decentralized service-oriented trust management model for healthcare IoT. A measure of evidence distance is used to reward well-behaving healthcare service/information providers as well as referrers and punish malicious entities. In this context-aware model, trust is estimated based on direct experiences and indirect feedbacks of recommenders. The process runs in two contexts; trust to healthcare service and trust to recommendation. When personal direct experience does not exist, trust to a source or service is estimated by applying the combinatorial laws of evidence theory and integrating indirect trust values. The proposed model is secure against bad-mouthing, good-mouthing, and on-off attacks due to its dynamic parameters and using the concept of evidence distance. Our results confirm the robustness and efficiency of this scheme.


Subject(s)
Computer Security , Internet of Things , Algorithms , Humans , Reproducibility of Results , Trust
6.
IEEE/ACM Trans Comput Biol Bioinform ; 18(5): 1645-1666, 2021.
Article in English | MEDLINE | ID: mdl-33465029

ABSTRACT

Brain-Computer interfaces (BCIs) enhance the capability of human brain activities to interact with the environment. Recent advancements in technology and machine learning algorithms have increased interest in electroencephalographic (EEG)-based BCI applications. EEG-based intelligent BCI systems can facilitate continuous monitoring of fluctuations in human cognitive states under monotonous tasks, which is both beneficial for people in need of healthcare support and general researchers in different domain areas. In this review, we survey the recent literature on EEG signal sensing technologies and computational intelligence approaches in BCI applications, compensating for the gaps in the systematic summary of the past five years. Specifically, we first review the current status of BCI and signal sensing technologies for collecting reliable EEG signals. Then, we demonstrate state-of-the-art computational intelligence techniques, including fuzzy models and transfer learning in machine learning and deep learning algorithms, to detect, monitor, and maintain human cognitive states and task performance in prevalent applications. Finally, we present a couple of innovative BCI-inspired healthcare applications and discuss future research directions in EEG-based BCI research.


Subject(s)
Brain-Computer Interfaces , Electroencephalography , Epilepsy , Machine Learning , Signal Processing, Computer-Assisted , Algorithms , Epilepsy/diagnosis , Epilepsy/physiopathology , Humans
SELECTION OF CITATIONS
SEARCH DETAIL
...