2022
DOI: 10.1016/j.neuri.2021.100030
|View full text |Cite
|
Sign up to set email alerts
|

A blockchain security module for brain-computer interface (BCI) with Multimedia Life Cycle Framework (MLCF)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 87 publications
0
11
0
Order By: Relevance
“…The KDDCup 99 dataset is one of the popular datasets in IoT with cybersecurity [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47]. This dataset provides labelled and unlabeled training and testing data, and it originated from the evaluation program DARPA98 IDS with corresponds to seven and two weeks [33], [41], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74]. The UNSW-NB15 dataset was created by perfectStorm (IXIA) in collaboration with the UNSW Cyber Range Lab to generate moderately aggressive activities and attacks.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The KDDCup 99 dataset is one of the popular datasets in IoT with cybersecurity [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47]. This dataset provides labelled and unlabeled training and testing data, and it originated from the evaluation program DARPA98 IDS with corresponds to seven and two weeks [33], [41], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74]. The UNSW-NB15 dataset was created by perfectStorm (IXIA) in collaboration with the UNSW Cyber Range Lab to generate moderately aggressive activities and attacks.…”
Section: Methodsmentioning
confidence: 99%
“…The research on ML-AIDS identifies and efficiently implements the effective and efficient anomalies of networks and computers [70]. Recently, many researchers have been dedicated to developing ML with NIDs [41], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70]. The IDS faced challenges in accuracy by reducing false alarm rates.…”
Section: Related Workmentioning
confidence: 99%
“…It is considered one of the costliest communication methods while training a huge scale of multi-node modeling. However, there are a lot of vulnerabilities involved that are recorded due to the weak security of federated learning, which leads to label flipping and gradient leakage-based attacks [39,40]. The process of training the general model is compromised directly by different adversaries.…”
Section: A Industrial Internet Of Things (Iiot) and Smart Industriesmentioning
confidence: 99%
“…After this process, the high-level knowledge states that are pertinent to wisdom are shown in Figure 1. When knowledge is truly refined and sublimated, the receiver has the potential to minimize and maximize interaction with the medical environment [2,3].…”
Section: Introductionmentioning
confidence: 99%