Cardio-ML: Detection of malicious clinical programmings aimed at cardiac implantable electronic devices based on machine learning and a missing values resemblance framework

[1]  Ibrahim Gad,et al.  A robust deep learning model for missing value imputation in big NCDC dataset , 2020, Iran J. Comput. Sci..

[2]  C. Doerr,et al.  IMDfence: Architecting a Secure Protocol for Implantable Medical Devices , 2020, IEEE Access.

[3]  Xiaojiang Du,et al.  Biometric-based authentication scheme for Implantable Medical Devices during emergency situations , 2019, Future Gener. Comput. Syst..

[4]  Lior Rokach,et al.  Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework , 2019, IEEE Access.

[5]  Nir Nissim,et al.  Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems , 2019, J. Biomed. Informatics.

[6]  Mohsen Guizani,et al.  Multi-layer security scheme for implantable medical devices , 2018, Neural Computing and Applications.

[7]  T. Aziz,et al.  Security of implantable medical devices with wireless connections: The dangers of cyber-attacks , 2018, Expert review of medical devices.

[8]  Wenyuan Xu,et al.  Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists , 2017, Pacing and clinical electrophysiology : PACE.

[9]  Yuval Shahar,et al.  Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods , 2017, Artif. Intell. Medicine.

[10]  Yuval Elovici,et al.  ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology , 2017, IEEE Transactions on Information Forensics and Security.

[11]  Yuval Shahar,et al.  Improving condition severity classification with an efficient active learning based framework , 2016, J. Biomed. Informatics.

[12]  John M Lachin,et al.  Fallacies of last observation carried forward analyses , 2016, Clinical trials.

[13]  Kristin L. Sainani Dealing With Missing Data , 2015, PM & R : the journal of injury, function, and rehabilitation.

[14]  Yuval Shahar,et al.  An Active Learning Framework for Efficient Condition Severity Classification , 2015, AIME.

[15]  Juan E. Tapiador,et al.  Security and privacy issues in implantable medical devices: A comprehensive survey , 2015, J. Biomed. Informatics.

[16]  Roderick J. A. Little,et al.  Single Imputation Methods , 2014, Statistical Analysis with Missing Data, Third Edition.

[17]  Roderick J. A. Little,et al.  Complete‐Case and Available‐Case Analysis, Including Weighting Methods , 2014, Statistical Analysis with Missing Data, Third Edition.

[18]  D. Rubin,et al.  Estimation of Imputation Uncertainty , 2014 .

[19]  Ning Lu,et al.  Concept drift detection via competence models , 2014, Artif. Intell..

[20]  Christos Strydis,et al.  Adaptive entity-identifier generation for IMD emergency access , 2014, CS2 '14.

[21]  KatabiDina,et al.  They can hear your heartbeats , 2011 .

[22]  H. Mond,et al.  The 11th World Survey of Cardiac Pacing and Implantable Cardioverter‐Defibrillators: Calendar Year 2009–A World Society of Arrhythmia's Project , 2011, Pacing and clinical electrophysiology : PACE.

[23]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[24]  E. Stuart,et al.  Multiple imputation by chained equations: what is it and how does it work? , 2011, International journal of methods in psychiatric research.

[25]  William A. Young,et al.  A survey of methodologies for the treatment of missing values within datasets: limitations and benefits , 2011 .

[26]  Jie Wu,et al.  Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[27]  Jeremy A. Hansen,et al.  A taxonomy of vulnerabilities in implantable medical devices , 2010, SPIMACS '10.

[28]  Aníbal R. Figueiras-Vidal,et al.  Pattern classification with missing data: a review , 2010, Neural Computing and Applications.

[29]  Srdjan Capkun,et al.  Proximity-based access control for implantable medical devices , 2009, CCS.

[30]  Andreas Christmann,et al.  Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.

[31]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[32]  Xindong Wu,et al.  The Top Ten Algorithms in Data Mining , 2009 .

[33]  Kevin Fu,et al.  Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security , 2008, HotSec.

[34]  Daniel Schunk,et al.  A Markov chain Monte Carlo algorithm for multiple imputation in large surveys , 2008 .

[35]  Yuval Elovici,et al.  Malicious Code Detection and Acquisition Using Active Learning , 2007, 2007 IEEE Intelligence and Security Informatics.

[36]  Shichao Zhang,et al.  "Missing is useful": missing values in cost-sensitive decision trees , 2005, IEEE Transactions on Knowledge and Data Engineering.

[37]  Robert P. W. Duin,et al.  Combining One-Class Classifiers to Classify Missing Data , 2004, Multiple Classifier Systems.

[38]  Ran El-Yaniv,et al.  Online Choice of Active Learning Algorithms , 2003, J. Mach. Learn. Res..

[39]  T. Åstebro,et al.  How to Deal with Missing Categorical Data: Test of a Simple Bayesian Method , 2003 .

[40]  Gustavo E. A. P. A. Batista,et al.  An analysis of four missing data treatment methods for supervised learning , 2003, Appl. Artif. Intell..

[41]  Roderick J. A. Little,et al.  Statistical Analysis with Missing Data: Little/Statistical Analysis with Missing Data , 2002 .

[42]  Sophie Midenet,et al.  Self-Organising Map for Data Imputation and Correction in Surveys , 2002, Neural Computing & Applications.

[43]  Therese D. Pigott,et al.  A Review of Methods for Missing Data , 2001 .

[44]  T. Moon The expectation-maximization algorithm , 1996, IEEE Signal Process. Mag..

[45]  J V Tu,et al.  Advantages and disadvantages of using artificial neural networks versus logistic regression for predicting medical outcomes. , 1996, Journal of clinical epidemiology.

[46]  Amit Gupta,et al.  Estimating Missing Values Using Neural Networks , 1996 .

[47]  Mark A. Kramer,et al.  Autoassociative neural networks , 1992 .

[48]  Jerzy W. Grzymala-Busse,et al.  On the Unknown Attribute Values in Learning from Examples , 1991, ISMIS.

[49]  Yuval Shahar,et al.  CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices , 2020, IEEE Access.

[50]  Geethapriya Thamilarasu,et al.  Protect Your Pacemaker: Blockchain based Authentication and Consented Authorization for Implanted Medical Devices , 2020 .

[51]  Sebastian Schelter,et al.  DataWig: Missing Value Imputation for Tables , 2019, J. Mach. Learn. Res..

[52]  Theodore B. Trafalis,et al.  Missing Data Imputation Through Machine Learning Algorithms , 2009 .

[53]  J. C. Schlimmer,et al.  Incremental learning from noisy data , 2004, Machine Learning.

[54]  Peter Clark,et al.  The CN2 induction algorithm , 2004, Machine Learning.

[55]  Gustavo E. A. P. A. Batista,et al.  A Study of K-Nearest Neighbour as an Imputation Method , 2002, HIS.

[56]  2008 IEEE Symposium on Security and Privacy Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2022 .