期刊文献+
共找到47,650篇文章
< 1 2 250 >
每页显示 20 50 100
基于Z-Score动态压缩的高效联邦学习算法
1
作者 刘乔寿 皮胜文 原炜锡 《计算机应用研究》 CSCD 北大核心 2024年第7期2093-2097,共5页
联邦学习作为一种具有隐私保护的新兴分布式计算范式,在一定程度上保护了用户隐私和数据安全。然而,由于联邦学习系统中客户端与服务器需要频繁地交换模型参数,造成了较大的通信开销。在带宽有限的无线通信场景中,这成为了限制联邦学习... 联邦学习作为一种具有隐私保护的新兴分布式计算范式,在一定程度上保护了用户隐私和数据安全。然而,由于联邦学习系统中客户端与服务器需要频繁地交换模型参数,造成了较大的通信开销。在带宽有限的无线通信场景中,这成为了限制联邦学习发展的主要瓶颈。针对这一问题,提出了一种基于Z-Score的动态稀疏压缩算法。通过引入Z-Score,对局部模型更新进行离群点检测,将重要的更新值视为离群点,从而将其挑选出来。在不需要复杂的排序算法以及原始模型更新的先验知识的情况下,实现模型更新的稀疏化。同时随着通信轮次的增加,根据全局模型的损失值动态地调整稀疏率,从而在保证模型精度的前提下最大程度地减少总通信量。通过实验证明,在I.I.D.数据场景下,该算法与联邦平均(FedAvg)算法相比可以降低95%的通信量,精度损失仅仅为1.6%,与FTTQ算法相比可以降低40%~50%的通信量,精度损失仅为1.29%,证明了该方法在保证模型性能的同时显著降低了通信成本。 展开更多
关键词 联邦学习 Z-score 稀疏化 动态稀疏率
下载PDF
基于F-score和二进制灰狼优化的肿瘤基因选择方法
2
作者 穆晓霞 郑李婧 《南京师大学报(自然科学版)》 CAS 北大核心 2024年第1期111-120,共10页
针对肿瘤基因数据维度高、噪声多、冗余性高的现状,结合Spearman相关系数改进F-score算法,在此基础上优化二进制灰狼算法,提出了一种基于改进F-score和二进制灰狼算法的肿瘤基因选择算法.首先,考虑特征之间的相关性,计算每个特征的F-sc... 针对肿瘤基因数据维度高、噪声多、冗余性高的现状,结合Spearman相关系数改进F-score算法,在此基础上优化二进制灰狼算法,提出了一种基于改进F-score和二进制灰狼算法的肿瘤基因选择算法.首先,考虑特征之间的相关性,计算每个特征的F-score值和特征之间的Spearman相关系数的绝对值;然后,计算权重系数得出各个特征的权重值,依据重要性进行排序,选出初选特征子集;最后,通过收敛因子的衰减曲线和初始化方法优化二进制灰狼算法,调整全局搜索和局部搜索所占比例,增强全局搜索能力并提高局部搜索速度,有效节省时间开销,提升特征选择的分类性能和效率,得到最优特征子集.在9个肿瘤基因数据集上测试所提算法,在分类准确率和筛选特征数目两个指标上进行仿真实验,并与4种其他算法进行对比,实验结果证明所提算法表现良好,可有效降低基因数据维度,并具有较好的分类精度. 展开更多
关键词 肿瘤基因 Fisher-score Spearman 相关系数 二进制灰狼优化算法 特征选择
下载PDF
中医药团体标准评价体系(SCORE-TCM)解读 被引量:1
3
作者 宗星煜 王丁熠 +15 位作者 王丽颖 赵学尧 林甲昊 刘斌 虞雪云 郭旸 梁宁 车前子 蒋寅 张海力 龚照元 李安 王巍力 李慧珍 史楠楠 王燕平 《中国中医基础医学杂志》 CAS CSCD 2024年第4期622-626,共5页
本文全面解读了中医药团体标准评价体系(System of Consortium Standards Rating and Evaluation of Traditional Chinese Medicine,SCORE-TCM)。SCORE-TCM是结合定性与定量评价,全面评估中医药团体标准在制定主体、文本编写、技术内容... 本文全面解读了中医药团体标准评价体系(System of Consortium Standards Rating and Evaluation of Traditional Chinese Medicine,SCORE-TCM)。SCORE-TCM是结合定性与定量评价,全面评估中医药团体标准在制定主体、文本编写、技术内容、推广应用和实施效益等几方面特征的综合评价工具。文中详述了SCORE-TCM的构建目的、定义和构建过程,解释了评价指标体系中的各项指标,并对每项指标的评价材料进行介绍。本文旨在帮助中医药团体标准的制定者、第三方评价机构和其他相关方更好地理解SCORE-TCM各评价条目的含义,更有效地运用于中医药团体标准的自评价或第三方评价,SCORE-TCM将为《中医药团体标准管理办法》的贯彻实施,以及中医药团体标准的高质量发展提供技术支持。 展开更多
关键词 中医药 团体标准 score-TCM 评价工具 解读
下载PDF
Gustave Roussy Immune Score——结直肠癌患者的新型预后评分 被引量:1
4
作者 韦珊珊 胡文蔚 耿一婷 《临床肿瘤学杂志》 CAS 2024年第1期43-49,共7页
目的探讨Gustave Roussy Immune Score(GRIm评分)在结直肠癌(CRC)根治术后患者预后评估中的价值。方法本研究共纳入2004年6月至2019年8月271例CRC根治术后患者。分析GRIm评分与CRC临床病理特征的关系。采用Kaplan-Meier法绘制CRC患者无... 目的探讨Gustave Roussy Immune Score(GRIm评分)在结直肠癌(CRC)根治术后患者预后评估中的价值。方法本研究共纳入2004年6月至2019年8月271例CRC根治术后患者。分析GRIm评分与CRC临床病理特征的关系。采用Kaplan-Meier法绘制CRC患者无病生存时间(DFS)曲线,生存差异行Log-rank检验;Cox风险比例回归模型分析影响CRC患者预后的因素;校准曲线和受试者工作特征(ROC)曲线检验基于GRIm评分的列线图的预测效能。结果GRIm评分与性别、肿瘤部位、神经侵犯、N分期、美国癌症联合委员会(AJCC)分期、白蛋白(ALB)评分和乳酸脱氢酶(LDH)评分有关(P<0.05);GRIm简化评分与肿瘤部位、肿瘤直径、癌栓、ALB评分和LDH评分有关(P<0.05)。Cox风险比例回归模型显示,GRIm评分是影响CRC患者DFS的独立因素(HR=2.546,95%CI:1.644~3.943,P<0.05)。包括GRIm评分的列线图对CRC患者DFS的预测能力优于第8版AJCC分期系统。结论GRIm评分是影响CRC患者DFS的独立因素,基于GRIm评分的列线图可以帮助临床医师有效评估CRC患者的预后,制定个体化治疗方案。 展开更多
关键词 结直肠癌 GRIm评分 列线图 预后
下载PDF
基于中心偏移的Fisher score与直觉邻域模糊熵的多标记特征选择 被引量:1
5
作者 孙林 马天娇 《计算机科学》 CSCD 北大核心 2024年第7期96-107,共12页
现有多标记Fisher score模型中边缘样本会影响算法分类效果。鉴于邻域直觉模糊熵处理不确定信息时具有更强的表达能力与分辨能力的优势,文中提出了一种基于中心偏移的Fisher score与邻域直觉模糊熵的多标记特征选择方法。首先,根据标记... 现有多标记Fisher score模型中边缘样本会影响算法分类效果。鉴于邻域直觉模糊熵处理不确定信息时具有更强的表达能力与分辨能力的优势,文中提出了一种基于中心偏移的Fisher score与邻域直觉模糊熵的多标记特征选择方法。首先,根据标记将多标记论域划分为多个样本集,计算样本集的特征均值作为标记下样本的原始中心点,以最远样本的距离乘以距离系数,去除边缘样本集,定义了新的有效样本集,计算中心偏移处理后的标记下每个特征的得分以及标记集的特征得分,进而建立了基于中心偏移的多标记Fisher score模型,预处理多标记数据。然后,引入多标记分类间隔作为自适应模糊邻域半径参数,定义了模糊邻域相似关系和模糊邻域粒,由此构造了多标记模糊邻域粗糙集的上、下近似集;在此基础上提出了多标记邻域粗糙直觉隶属度函数和非隶属度函数,定义了多标记邻域直觉模糊熵。最后,给出了特征的外部和内部重要度的计算公式,设计了基于邻域直觉模糊熵的多标记特征选择算法,筛选出最优特征子集。在多标记K近邻分类器下、9个多标记数据集上的实验结果表明,所提算法选择的最优子集具有良好的分类性能。 展开更多
关键词 多标记学习 特征选择 Fisher score 多标记模糊邻域粗糙集 邻域直觉模糊熵
下载PDF
Role of albumin-bilirubin score in non-malignant liver disease 被引量:2
6
作者 Shi-Xue Xu Fan Yang +2 位作者 Nan Ge Jin-Tao Guo Si-Yu Sun 《World Journal of Gastroenterology》 SCIE CAS 2024年第9期999-1004,共6页
The albumin-bilirubin(ALBI)score,which was proposed to assess the prognosis of patients with hepatocellular carcinoma,has gradually been extended to other liver diseases in recent years,including primary biliary chola... The albumin-bilirubin(ALBI)score,which was proposed to assess the prognosis of patients with hepatocellular carcinoma,has gradually been extended to other liver diseases in recent years,including primary biliary cholangitis,liver cirrhosis,hepatitis,liver transplantation,and liver injury.The ALBI score is often compared with classical scores such as the Child-Pugh and model for end-stage liver disease scores or other noninvasive prediction models.It is widely employed because of its immunity to subjective evaluation indicators and ease of obtaining detection indicators.An increasing number of studies have confirmed that it is highly accurate for assessing the prognosis of patients with chronic liver disease;additionally,it has demonstrated good predictive performance for outcomes beyond survival in patients with liver diseases,such as decompensation events.This article presents a review of the application of ALBI scores in various non-malignant liver diseases. 展开更多
关键词 Albumin-bilirubin score Liver cirrhosis Primary biliary cholangitis Hepatitis Liver transplantation Liver injury
下载PDF
Ground threat prediction-based path planning of unmanned autonomous helicopter using hybrid enhanced artificial bee colony algorithm 被引量:1
7
作者 Zengliang Han Mou Chen +1 位作者 Haojie Zhu Qingxian Wu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期1-22,共22页
Unmanned autonomous helicopter(UAH)path planning problem is an important component of the UAH mission planning system.Aiming to reduce the influence of non-complete ground threat information on UAH path planning,a gro... Unmanned autonomous helicopter(UAH)path planning problem is an important component of the UAH mission planning system.Aiming to reduce the influence of non-complete ground threat information on UAH path planning,a ground threat prediction-based path planning method is proposed based on artificial bee colony(ABC)algorithm by collaborative thinking strategy.Firstly,a dynamic threat distribution probability model is developed based on the characteristics of typical ground threats.The dynamic no-fly zone of the UAH is simulated and established by calculating the distribution probability of ground threats in real time.Then,a dynamic path planning method for UAH is designed in complex environment based on the real-time prediction of ground threats.By adding the collision warning mechanism to the path planning model,the flight path could be dynamically adjusted according to changing no-fly zones.Furthermore,a hybrid enhanced ABC algorithm is proposed based on collaborative thinking strategy.The proposed algorithm applies the leader-member thinking mechanism to guide the direction of population evolution,and reduces the negative impact of local optimal solutions caused by collaborative learning update strategy,which makes the optimization performance of ABC algorithm more controllable and efficient.Finally,simulation results verify the feasibility and effectiveness of the proposed ground threat prediction path planning method. 展开更多
关键词 UAH Path planning Ground threat prediction Hybrid enhanced Collaborative thinking
下载PDF
Current status of magnetic resonance imaging radiomics in hepatocellular carcinoma:A quantitative review with Radiomics Quality Score 被引量:2
8
作者 Valentina Brancato Marco Cerrone +2 位作者 Nunzia Garbino Marco Salvatore Carlo Cavaliere 《World Journal of Gastroenterology》 SCIE CAS 2024年第4期381-417,共37页
BACKGROUND Radiomics is a promising tool that may increase the value of magnetic resonance imaging(MRI)for different tasks related to the management of patients with hepatocellular carcinoma(HCC).However,its implement... BACKGROUND Radiomics is a promising tool that may increase the value of magnetic resonance imaging(MRI)for different tasks related to the management of patients with hepatocellular carcinoma(HCC).However,its implementation in clinical practice is still far,with many issues related to the methodological quality of radiomic studies.AIM To systematically review the current status of MRI radiomic studies concerning HCC using the Radiomics Quality Score(RQS).METHODS A systematic literature search of PubMed,Google Scholar,and Web of Science databases was performed to identify original articles focusing on the use of MRI radiomics for HCC management published between 2017 and 2023.The methodological quality of radiomic studies was assessed using the RQS tool.Spearman’s correlation(ρ)analysis was performed to explore if RQS was correlated with journal metrics and characteristics of the studies.The level of statistical significance was set at P<0.05.RESULTS One hundred and twenty-seven articles were included,of which 43 focused on HCC prognosis,39 on prediction of pathological findings,16 on prediction of the expression of molecular markers outcomes,18 had a diagnostic purpose,and 11 had multiple purposes.The mean RQS was 8±6.22,and the corresponding percentage was 24.15%±15.25%(ranging from 0.0% to 58.33%).RQS was positively correlated with journal impact factor(IF;ρ=0.36,P=2.98×10^(-5)),5-years IF(ρ=0.33,P=1.56×10^(-4)),number of patients included in the study(ρ=0.51,P<9.37×10^(-10))and number of radiomics features extracted in the study(ρ=0.59,P<4.59×10^(-13)),and time of publication(ρ=-0.23,P<0.0072).CONCLUSION Although MRI radiomics in HCC represents a promising tool to develop adequate personalized treatment as a noninvasive approach in HCC patients,our study revealed that studies in this field still lack the quality required to allow its introduction into clinical practice. 展开更多
关键词 Hepatocellular carcinoma Systematic review Magnetic resonance imaging Radiomics Radiomics quality score
下载PDF
Are we ready to use new endoscopic scores for ulcerative colitis? 被引量:1
9
作者 Rodrigo Quera Paulina Núñez F 《World Journal of Gastroenterology》 SCIE CAS 2024年第10期1466-1469,共4页
For ulcerative colitis(UC),the variability in inflammatory activity along the colon poses a challenge in management.The focus on achieving endoscopic healing in UC is evident,where the UC Endoscopic Index of Severity ... For ulcerative colitis(UC),the variability in inflammatory activity along the colon poses a challenge in management.The focus on achieving endoscopic healing in UC is evident,where the UC Endoscopic Index of Severity and Mayo Endoscopic Subscore are commonly used for evaluation.However,these indices primarily consider the most severely affected region.Liu et al recent study validates the Toronto Inflammatory Bowel Disease Global Endoscopic Reporting(TIGER)score offering a comprehensive assessment of inflammatory activity across diverse segments of the colon and rectum and a reliable index correlating strongly with UC Endoscopic Index of Severity and moderately with Mayo Endoscopic Subscore(MES).Despite recommendation,certain aspects warrant further invest-igation.Fecal calprotectin,an intermediate target,correlates with TIGER and should be explored.Determining TIGER scores defining endoscopic remission and response,evaluating agreement with histological activity,and assessing inter-endoscopist agreement for TIGER require scrutiny.Exploring the correlation between TIGER and intestinal ultrasound,akin to MES,adds value. 展开更多
关键词 Ulcerative colitis SIGMOIDOSCOPY COLONOSCOPY score index
下载PDF
A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT 被引量:1
10
作者 Yifan Liu Shancang Li +1 位作者 Xinheng Wang Li Xu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1233-1261,共29页
The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated... The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats. 展开更多
关键词 Cyber security Industrial Internet of Things artificial intelligence machine learning algorithms hybrid cyber threats
下载PDF
Fecal calprotectin and endoscopic scores: The cornerstones in clinical practice for evaluating mucosal healing in inflammatory bowel disease 被引量:1
11
作者 Marcia Henriques de Magalhães Costa Ligia Yukie Sassaki Júlio Maria Fonseca Chebli 《World Journal of Gastroenterology》 SCIE CAS 2024年第24期3022-3035,共14页
Managing inflammatory bowel disease(IBD)is becoming increasingly complex and personalized,considering the advent of new advanced therapies with distinct mechanisms of action.Achieving mucosal healing(MH)is a pivotal t... Managing inflammatory bowel disease(IBD)is becoming increasingly complex and personalized,considering the advent of new advanced therapies with distinct mechanisms of action.Achieving mucosal healing(MH)is a pivotal therapeutic goal in IBD management and can prevent IBD progression and reduce flares,hospitalization,surgery,intestinal damage,and colorectal cancer.Employing proactive disease and therapy assessment is essential to achieve better control of intestinal inflammation,even if subclinical,to alter the natural course of IBD.Periodic monitoring of fecal calprotectin(FC)levels and interval endoscopic evaluations are cornerstones for evaluating response/remission to advanced therapies targeting IBD,assessing MH,and detecting subclinical recurrence.Here,we comment on the article by Ishida et al Moreover,this editorial aimed to review the role of FC and endoscopic scores in predicting MH in patients with IBD.Furthermore,we intend to present some evidence on the role of these markers in future targets,such as histological and transmural healing.Additional prospective multicenter studies with a stricter MH criterion,standardized endoscopic and histopathological analyses,and virtual chromoscopy,potentially including artificial intelligence and other biomarkers,are desired. 展开更多
关键词 Fecal calprotectin Endoscopic scores Mucosal healing Histological healing Ulcerative colitis Inflammatory bowel diseases
下载PDF
Preoperative albumin-bilirubin score and liver resection percentage determine postoperative liver regeneration after partial hepatectomy 被引量:1
12
作者 Kazuhiro Takahashi Masahiko Gosho +11 位作者 Yoshihiro Miyazaki Hiromitsu Nakahashi Osamu Shimomura Kinji Furuya Manami Doi Yohei Owada Koichi Ogawa Yusuke Ohara Yoshimasa Akashi Tsuyoshi Enomoto Shinji Hashimoto Tatsuya Oda 《World Journal of Gastroenterology》 SCIE CAS 2024年第14期2006-2017,共12页
BACKGROUND The success of liver resection relies on the ability of the remnant liver to regenerate.Most of the knowledge regarding the pathophysiological basis of liver regeneration comes from rodent studies,and data ... BACKGROUND The success of liver resection relies on the ability of the remnant liver to regenerate.Most of the knowledge regarding the pathophysiological basis of liver regeneration comes from rodent studies,and data on humans are scarce.Additionally,there is limited knowledge about the preoperative factors that influence postoperative regeneration.AIM To quantify postoperative remnant liver volume by the latest volumetric software and investigate perioperative factors that affect posthepatectomy liver regenera-tion.METHODS A total of 268 patients who received partial hepatectomy were enrolled.Patients were grouped into right hepatectomy/trisegmentectomy(RH/Tri),left hepa-tectomy(LH),segmentectomy(Seg),and subsegmentectomy/nonanatomical hepatectomy(Sub/Non)groups.The regeneration index(RI)and late rege-neration rate were defined as(postoperative liver volume)/[total functional liver volume(TFLV)]×100 and(RI at 6-months-RI at 3-months)/RI at 6-months,respectively.The lower 25th percentile of RI and the higher 25th percentile of late regeneration rate in each group were defined as“low regeneration”and“delayed regeneration”.“Restoration to the original size”was defined as regeneration of the liver volume by more than 90%of the TFLV at 12 months postsurgery.RESULTS The numbers of patients in the RH/Tri,LH,Seg,and Sub/Non groups were 41,53,99 and 75,respectively.The RI plateaued at 3 months in the LH,Seg,and Sub/Non groups,whereas the RI increased until 12 months in the RH/Tri group.According to our multivariate analysis,the preoperative albumin-bilirubin(ALBI)score was an independent factor for low regeneration at 3 months[odds ratio(OR)95%CI=2.80(1.17-6.69),P=0.02;per 1.0 up]and 12 months[OR=2.27(1.01-5.09),P=0.04;per 1.0 up].Multivariate analysis revealed that only liver resection percentage[OR=1.03(1.00-1.05),P=0.04]was associated with delayed regeneration.Furthermore,multivariate analysis demonstrated that the preoperative ALBI score[OR=2.63(1.00-1.05),P=0.02;per 1.0 up]and liver resection percentage[OR=1.02(1.00-1.05),P=0.04;per 1.0 up]were found to be independent risk factors associated with volume restoration failure.CONCLUSION Liver regeneration posthepatectomy was determined by the resection percentage and preoperative ALBI score.This knowledge helps surgeons decide the timing and type of rehepatectomy for recurrent cases. 展开更多
关键词 Liver regeneration Albumin-bilirubin score Liver resection percentage Partial hepatectomy Human Regeneration index
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
13
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time threat Analysis Cyber threats Cyberattacks threat Intelligence Machine Learning Artificial Intelligence threat Detection threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME threat Actors threat Modeling Security Architecture
下载PDF
IWTW:A Framework for IoWT Cyber Threat Analysis
14
作者 GyuHyun Jeon Hojun Jin +2 位作者 Ju Hyeon Lee Seungho Jeon Jung Taek Seo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1575-1622,共48页
The Internet of Wearable Things(IoWT)or Wearable Internet of Things(WIoT)is a new paradigm that combines IoT and wearable technology.Advances in IoT technology have enabled the miniaturization of sensors embedded in w... The Internet of Wearable Things(IoWT)or Wearable Internet of Things(WIoT)is a new paradigm that combines IoT and wearable technology.Advances in IoT technology have enabled the miniaturization of sensors embedded in wearable devices and the ability to communicate data and access real-time information over low-power mobile networks.IoWT devices are highly interdependent with mobile devices.However,due to their limited processing power and bandwidth,IoWT devices are vulnerable to cyberattacks due to their low level of security.Threat modeling and frameworks for analyzing cyber threats against existing IoT or low-power protocols have been actively researched.The threat analysis framework used in existing studies was limited to specific protocols and did not target IoWT devices.In addition,In the literature surveyed to date,no cyber threat analysis framework is targeting IoWT.Therefore,the threat model presented in the existing research on cyber threat analysis and modeling for IoWT is specialized for specific devices.In addition,because it does not present standardized attack tactics and techniques,there is a limitation in that it is difficult to identify attacks quickly.In this paper,we propose an Internet of Wearable Things threat analysis frameWork(IWTW)framework that can derive security threats through systematic analysis of IoWT attack cases and possible security threats and perform cyber threat analysis based on them.The methodology for developing the IWTW framework consists of three steps:Analysis,Standardization,and Compilation.IoWT attack cases and potential security threats are analyzed in the analysis stage.In the standardization stage,attack tactics and techniques derived from the analysis of attack cases and potential security threats are standardized,resulting in 3 attack categories,18 attack tactics,and 68 attack techniques.In the compilation stage,standardized security threats are combined to develop the IWTW framework ultimately.We present four case studies targeting MiBand 2,Fitbit Charge HR/Surge,Samsung Gear 3,Xiaomi Amazifit,Honor Band 5,Honor Watch ES,and Senbono CF-58 devices to validate the proposed IWTW framework.We analyzed the attack process through a case study and applied the IWTW framework to derive standardized attack categories,tactics,and techniques effectively.By applying the IWTW framework to cyber threat analysis targeting IoWT,security threats can be standardized,and the attack process can be quickly derived,enabling effective attack analysis on IoWT. 展开更多
关键词 Internet of wearable things wearable device threat framework security threat
下载PDF
基于SCORE-TCM的中医药团体标准抽样评价方案设计
15
作者 宗星煜 李慧珍 +13 位作者 赵学尧 程瑾瑞 李军 王丁熠 林甲昊 陈琳 王晶亚 梁宁 张海力 王梦琪 车前子 王丽颖 王燕平 史楠楠 《中国中医基础医学杂志》 CAS CSCD 2024年第1期66-70,共5页
目前,各社会团体积极参与中医药标准的制定和发布,特别是“十四五”以来,中医药团体标准化工作更是迎来了提质增效的关键阶段。深入评估社会团体发布的中医药标准质量,是推进中医药团体标准工作的关键环节和重点任务。前期已研制并形成... 目前,各社会团体积极参与中医药标准的制定和发布,特别是“十四五”以来,中医药团体标准化工作更是迎来了提质增效的关键阶段。深入评估社会团体发布的中医药标准质量,是推进中医药团体标准工作的关键环节和重点任务。前期已研制并形成了中医药团体标准评价体系(System of Consortium Standards Rating and Evaluation of Traditional Chinese Medicine, SCORETCM)。在上述背景下,本研究通过专家共识法,设计了一套基于SCORE-TCM的中医药团体标准抽样评价方案,应用场景为对于特定社会团体发布的标准,或各团体发布的特定技术类别的标准进行快速评估。该方案涵盖了标准抽样、材料收集、标准评价、结果解读的完整流程,为中医药团体标准的抽样评价工作提供了参考方案。 展开更多
关键词 中医药 团体标准 抽样 中医药团体标准评价体系 评价方案
下载PDF
Survey on Video Security:Examining Threats,Challenges,and Future Trends
16
作者 Ali Asghar Amna Shifa Mamoona Naveed Asghar 《Computers, Materials & Continua》 SCIE EI 2024年第9期3591-3635,共45页
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s... Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world. 展开更多
关键词 ATTACKS threats security services video manipulation video security
下载PDF
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
17
作者 Singamaneni Krishnapriya Sukhvinder Singh 《Computers, Materials & Continua》 SCIE EI 2024年第8期2675-2719,共45页
The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advan... The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advanced tools and techniques for attacking targets with specific goals.Even countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted attack.APT is a sophisticated attack that involves multiple stages and specific strategies.Besides,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security system.However,APTs are generally implemented in multiple stages.If one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack failure.The detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing challenges.This survey paper will provide knowledge about APT attacks and their essential steps.This follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the work.Data used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack. 展开更多
关键词 Advanced persistent threats APT cyber security intrusion detection cyber attacks
下载PDF
Resurvey After 20 Years:Updating the Distribution,Population,and Potential Threats of the Chinting Alpine Toad
18
作者 Yuezheng FAN Qingfeng CHEN +7 位作者 Yuwen CHENG Kaicheng TANG Ling SUN Yonghao HUANG Lan ZHAO Dong LIANG Xiaoyi WANG Junhua HU 《Asian Herpetological Research》 SCIE CSCD 2024年第2期73-81,共9页
Considering the increased anthropogenic impacts,species with a limited range and low detectability often lack fundamental information and conservation actions,placing them at a high risk of endangerment.The Chinting a... Considering the increased anthropogenic impacts,species with a limited range and low detectability often lack fundamental information and conservation actions,placing them at a high risk of endangerment.The Chinting alpine toad Scutiger chintingensis is a rare mountain amphibian endemic to the eastern margin of the Qinghai-Xizang Plateau in China.Within its whole distribution range,only three known populations(Wolong,Emei,and Wawu)exist and no recent population status report has been documented for this species over the past two decades.From 2020 to 2023,we investigated the species distribution,and assessed the risk factors for the main populations.We recorded this species in all distribution areas,and updated a new distribution site with a lower elevation limit.The relative population density was 0.024±0.012 ind./m^(2)on Mount Emei,whereas only 0.008±0.017 ind./m^(2)on Mount Wawu.No significant difference was observed in the number of individuals between the two populations;however,the relative population density was significantly different.Sewage and waste discharge resulting from the construction of scenic areas,as well as disturbances from tourism,were the primary anthropogenic factors that influenced the survival of this species.Our results provide the updated information on the distribution and population status of the Chinting alpine toad,and suggest that unrecorded populations,as well as a wider elevation range,may exist for this species.Our findings emphasise the importance of timely updates of species distribution and population information and offer a basis for the future conservation of endangered amphibians. 展开更多
关键词 DISTRIBUTION endemic amphibian population size Scutiger chintingensis threat factor
下载PDF
Insider threat detection approach for tobacco industry based on heterogeneous graph embedding
19
作者 季琦 LI Wei +2 位作者 PAN Bailin XUE Hongkai QIU Xiang 《High Technology Letters》 EI CAS 2024年第2期199-210,共12页
In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,t... In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods. 展开更多
关键词 insider threat detection advanced persistent threats graph construction heterogeneous graph embedding
下载PDF
Garg incontinence scores: New scoring system on the horizon to evaluate fecal incontinence. Will it make a difference?
20
作者 Petr Tsarkov Inna Tulina +2 位作者 Parvez Sheikh Darya D Shlyk Pankaj Garg 《World Journal of Gastroenterology》 SCIE CAS 2024年第3期204-210,共7页
The main aim of this opinion review is to comment on the recent article published by Garg et al in the World Journal of Gastroenterology 2023;29:4593–4603.The authors in the published article developed a new scoring ... The main aim of this opinion review is to comment on the recent article published by Garg et al in the World Journal of Gastroenterology 2023;29:4593–4603.The authors in the published article developed a new scoring system,Garg incon-tinence scores(GIS),for fecal incontinence(FI).FI is a chronic debilitating disease that has a severe negative impact on the quality of life of the patients.Rome IV criteria define FI as multiple episodes of solid or liquid stool passed into the clothes at least twice a month.The associated social stigmatization often leads to significant under-reporting of the condition,which further impairs management.An important point is that the complexity and vagueness of the disease make it difficult for the patients to properly define and report the magnitude of the problem to their physicians.Due to this,the management becomes even more difficult.This issue is resolved up to a considerable extent by a scoring ques-tionnaire.There were several scoring systems in use for the last three decades.The prominent of them were the Cleveland Clinic scoring system or the Wexner scoring system,St.Marks Hospital or Vaizey’s scores,and the FI severity index.However,there were several shortcomings in these scoring systems.In the opinion review,we tried to analyze the strength of GIS and compare it to the existing scoring systems.The main pitfalls in the existing scoring systems were that most of them gave equal weightage to different types of FI(solid,liquid,flatus,etc.),were not comprehensive,and took only the surgeon’s perception of FI into view.In GIS,almost all shortcomings of previous scoring systems had been addressed:different weights were assigned to different types of FI by a robust statistical methodology;the scoring system was made comprehensive by including all types of FI that were previously omitted(urge,stress and mucus FI)and gave priority to patients’rather than the physicians’perceptions while developing the scoring system.Due to this,GIS indeed looked like a paradigm shift in the evaluation of FI.However,it is too early to conclude this,as GIS needs to be validated for accuracy and simplicity in future studies. 展开更多
关键词 Fecal incontinence Scoring system URGE Stress Flatus
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部