Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks
暂无分享,去创建一个
Sukumar Mishra | P. Mohamed Shakeel | S. Baskar | Mustafa Musa Jaber | V. R. Sarma Dhulipala | P. Shakeel | S. Baskar | S. Mishra
[1] Jong Hyuk Park,et al. An enhanced security framework for home appliances in smart home , 2017, Human-centric Computing and Information Sciences.
[2] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Mariana Gerber,et al. Information security risk measures for Cloud-based personal health records , 2014, International Conference on Information Society (i-Society 2014).
[4] Robert Steele,et al. The Internet of Things and Next-generation Public Health Information Systems , 2013 .
[5] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[6] Michael Biehl,et al. Adaptive Relevance Matrices in Learning Vector Quantization , 2009, Neural Computation.
[7] Cong Wang,et al. Security and privacy mechanism for health internet of things , 2013 .
[8] Hwee Pink Tan,et al. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.
[9] Kan Siew Leong,et al. A secure multi-hop routing for IoT communication , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[10] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[11] Fagen Li,et al. Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.
[12] Dumitru Erhan,et al. Deep Neural Networks for Object Detection , 2013, NIPS.
[13] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[14] Sucha Smanchat,et al. INTERNET OF THINGS: A REVIEW OF APPLICATIONS AND TECHNOLOGIES , 2014 .
[15] NICK FEAMSTER. MITIGATING THE INCREASING RISKS OF AN INSECURE INTERNET OF THINGS , 2018 .
[16] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[17] Samy Bengio,et al. Links between perceptrons, MLPs and SVMs , 2004, ICML.
[18] J. Pujol. The solution of nonlinear inverse problems and the Levenberg-Marquardt method , 2007 .
[19] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[20] Martin A. Riedmiller,et al. Reinforcement learning for robot soccer , 2009, Auton. Robots.
[21] Mohd Anwar,et al. Security & Privacy Challenges in IoT-Based Health Cloud , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[22] Chin-Lung Hsu,et al. An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives , 2016, Comput. Hum. Behav..
[23] R. S. H. Istepanian,et al. The potential of Internet of m-health Things “m-IoT” for non-invasive glucose level sensing , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[24] Michael Biehl,et al. Distance Learning in Discriminative Vector Quantization , 2009, Neural Computation.
[25] Rajendra K. Raj,et al. Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryption , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.
[26] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[27] R. Polikar,et al. Ensemble based systems in decision making , 2006, IEEE Circuits and Systems Magazine.