Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 9 de 9
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
IEEE J Biomed Health Inform ; 28(3): 1644-1655, 2024 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-38194405

RESUMO

Brain functional connectivity (FC) networks inferred from functional magnetic resonance imaging (fMRI) have shown altered or aberrant brain functional connectome in various neuropsychiatric disorders. Recent application of deep neural networks to connectome-based classification mostly relies on traditional convolutional neural networks (CNNs) using input FCs on a regular Euclidean grid to learn spatial maps of brain networks neglecting the topological information of the brain networks, leading to potentially sub-optimal performance in brain disorder identification. We propose a novel graph deep learning framework that leverages non-Euclidean information inherent in the graph structure for classifying brain networks in major depressive disorder (MDD). We introduce a novel graph autoencoder (GAE) architecture, built upon graph convolutional networks (GCNs), to embed the topological structure and node content of large fMRI networks into low-dimensional representations. For constructing the brain networks, we employ the Ledoit-Wolf (LDW) shrinkage method to efficiently estimate high-dimensional FC metrics from fMRI data. We explore both supervised and unsupervised techniques for graph embedding learning. The resulting embeddings serve as feature inputs for a deep fully-connected neural network (FCNN) to distinguish MDD from healthy controls (HCs). Evaluating our model on resting-state fMRI MDD dataset, we observe that the GAE-FCNN outperforms several state-of-the-art methods for brain connectome classification, achieving the highest accuracy when using LDW-FC edges as node features. The graph embeddings of fMRI FC networks also reveal significant group differences between MDD and HCs. Our framework demonstrates the feasibility of learning graph embeddings from brain networks, providing valuable discriminative information for diagnosing brain disorders.


Assuntos
Encefalopatias , Conectoma , Transtorno Depressivo Maior , Humanos , Transtorno Depressivo Maior/diagnóstico por imagem , Encéfalo/diagnóstico por imagem , Conectoma/métodos , Imageamento por Ressonância Magnética/métodos , Redes Neurais de Computação
2.
Sci Rep ; 12(1): 5317, 2022 Mar 29.
Artigo em Inglês | MEDLINE | ID: mdl-35351928

RESUMO

Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National Institute of Standards and Technology (NIST) announced the Lightweight Cryptography (LWC) project. One of the finalists of the project is the TinyJAMBU cipher. This work evaluates the security of the cipher. The tool used for the evaluation is the cube attack. We present five distinguishing attacks DA1-DA5 and two key recovery attacks KRA1-KRA2. The first two distinguishing attacks (DA1 and DA2) are launched against the initialisation phase of the cipher. The best result achieved for the attacks is a distinguisher for an 18-bit cube, where the cipher variant consists of the full initialisation phase together with 438 rounds of the encryption phase. The key recovery attacks (KRA1 and KRA2) are also launched against the initialisation phase of the cipher. The best key recovery attack can be applied for a cipher variant that consists of the full initialisation phase together with 428 rounds of the encryption phase. The attacks DA3-DA5 present a collection of distinguishers up to 437 encryption rounds, whose 32-bit cubes are chosen from the plaintext, nonce, or associated data bits. The results are confirmed experimentally. A conclusion from the work is that TinyJAMBU has a better security margin against cube attacks than claimed by the designers.

3.
J Imaging ; 6(12)2020 Nov 30.
Artigo em Inglês | MEDLINE | ID: mdl-34460527

RESUMO

Several studies on micro-expression recognition have contributed mainly to accuracy improvement. However, the computational complexity receives lesser attention comparatively and therefore increases the cost of micro-expression recognition for real-time application. In addition, majority of the existing approaches required at least two frames (i.e., onset and apex frames) to compute features of every sample. This paper puts forward new facial graph features based on 68-point landmarks using Facial Action Coding System (FACS). The proposed feature extraction technique (FACS-based graph features) utilizes facial landmark points to compute graph for different Action Units (AUs), where the measured distance and gradient of every segment within an AU graph is presented as feature. Moreover, the proposed technique processes ME recognition based on single input frame sample. Results indicate that the proposed FACS-baed graph features achieve up to 87.33% of recognition accuracy with F1-score of 0.87 using leave one subject out cross-validation on SAMM datasets. Besides, the proposed technique computes features at the speed of 2 ms per sample on Xeon Processor E5-2650 machine.

4.
Front Psychol ; 9: 1128, 2018.
Artigo em Inglês | MEDLINE | ID: mdl-30042706

RESUMO

Over the last few years, automatic facial micro-expression analysis has garnered increasing attention from experts across different disciplines because of its potential applications in various fields such as clinical diagnosis, forensic investigation and security systems. Advances in computer algorithms and video acquisition technology have rendered machine analysis of facial micro-expressions possible today, in contrast to decades ago when it was primarily the domain of psychiatrists where analysis was largely manual. Indeed, although the study of facial micro-expressions is a well-established field in psychology, it is still relatively new from the computational perspective with many interesting problems. In this survey, we present a comprehensive review of state-of-the-art databases and methods for micro-expressions spotting and recognition. Individual stages involved in the automation of these tasks are also described and reviewed at length. In addition, we also deliberate on the challenges and future directions in this growing field of automatic facial micro-expression analysis.

5.
Technol Health Care ; 23 Suppl 2: S435-42, 2015.
Artigo em Inglês | MEDLINE | ID: mdl-26410510

RESUMO

BACKGROUND: Cardiovascular diseases are the most common cause of death worldwide and are characterized by arrhythmia (i.e. irregular rhythm of heartbeat). Arrhythmia occasionally happens under certain conditions, such as stress. Therefore, it is difficult to be diagnosed using electrocardiogram (ECG) devices available in hospitals for just a few minutes. Constant diagnosis and monitoring of heartbeat is required to reduce death caused by cardiovascular diseases. OBJECTIVE: Mobile healthcare system has emerged as a potential solution to assist patients in monitoring their own heart condition, especially those who are isolated from the reference hospital. This paper proposes a self-diagnostic electrocardiogram system for mobile healthcare that has the capability to perform a real-time ECG diagnostic. METHODS: The self-diagnostic capability of a real-time ECG signal is achieved by implementing a detrended fluctuation analysis (DFA) method. The result obtained from DFA is used to display the patient's health condition on a smartphone anytime and anywhere. If the health condition is critical, the system will alert the patient and his medical practitioner for further diagnosis. RESULTS: Experimental results verified the validity of the developed ECG diagnostic application on a smartphone. CONCLUSION: The proposed system can potentially reduce death caused by cardiovascular diseases by alerting the patient possibly undergoing a heart attack.


Assuntos
Eletrocardiografia Ambulatorial/métodos , Processamento de Sinais Assistido por Computador/instrumentação , Smartphone , Telemedicina/métodos , Humanos , Modelos Estatísticos
6.
PLoS One ; 10(5): e0124674, 2015.
Artigo em Inglês | MEDLINE | ID: mdl-25993498

RESUMO

Micro-expression recognition is still in the preliminary stage, owing much to the numerous difficulties faced in the development of datasets. Since micro-expression is an important affective clue for clinical diagnosis and deceit analysis, much effort has gone into the creation of these datasets for research purposes. There are currently two publicly available spontaneous micro-expression datasets--SMIC and CASME II, both with baseline results released using the widely used dynamic texture descriptor LBP-TOP for feature extraction. Although LBP-TOP is popular and widely used, it is still not compact enough. In this paper, we draw further inspiration from the concept of LBP-TOP that considers three orthogonal planes by proposing two efficient approaches for feature extraction. The compact robust form described by the proposed LBP-Six Intersection Points (SIP) and a super-compact LBP-Three Mean Orthogonal Planes (MOP) not only preserves the essential patterns, but also reduces the redundancy that affects the discriminality of the encoded features. Through a comprehensive set of experiments, we demonstrate the strengths of our approaches in terms of recognition accuracy and efficiency.


Assuntos
Expressão Facial , Reconhecimento Facial , Humanos
7.
ScientificWorldJournal ; 2014: 170906, 2014.
Artigo em Inglês | MEDLINE | ID: mdl-25207333

RESUMO

Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.


Assuntos
Algoritmos , Modelos Teóricos
8.
IEEE J Biomed Health Inform ; 18(1): 56-66, 2014 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-24403404

RESUMO

A clinical decision support system forms a critical capability to link health observations with health knowledge to influence choices by clinicians for improved healthcare. Recent trends toward remote outsourcing can be exploited to provide efficient and accurate clinical decision support in healthcare. In this scenario, clinicians can use the health knowledge located in remote servers via the Internet to diagnose their patients. However, the fact that these servers are third party and therefore potentially not fully trusted raises possible privacy concerns. In this paper, we propose a novel privacy-preserving protocol for a clinical decision support system where the patients' data always remain in an encrypted form during the diagnosis process. Hence, the server involved in the diagnosis process is not able to learn any extra knowledge about the patient's data and results. Our experimental results on popular medical datasets from UCI-database demonstrate that the accuracy of the proposed protocol is up to 97.21% and the privacy of patient data is not compromised.


Assuntos
Segurança Computacional , Confidencialidade , Sistemas de Apoio a Decisões Clínicas , Máquina de Vetores de Suporte , Bases de Dados Factuais , Humanos , Internet , Distribuição Normal
9.
J Med Syst ; 37(6): 9993, 2013 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-24194093

RESUMO

Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.


Assuntos
Segurança Computacional/normas , Confidencialidade/normas , Troca de Informação em Saúde/normas , Algoritmos , Registros Eletrônicos de Saúde/normas , Humanos
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...