-
81
Peering into the Heart: A Comprehensive Exploration of Semantic Segmentation and Explainable AI on the MnMs-2 Cardiac MRI Dataset
Published 2025-01-01“…Accurate and interpretable segmentation of medical images is crucial for computer-aided diagnosis and image-guided interventions. …”
Get full text
Article -
82
Sense of agency in gesture-based interactions: modulated by sensory modality but not feedback meaning
Published 2025-01-01Get full text
Article -
83
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
Published 2016-01-01“…In addition, the shared key of encryption can be easily computed by the user and trusted server using the Chebyshev map without additional burdensome key management. …”
Get full text
Article -
84
An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection
Published 2023-01-01“…The e-mails that pretend to be from a trusted company to provide “financial or personal information” are phishing e-mails. …”
Get full text
Article -
85
Interpretable Machine Learning Techniques for an Advanced Crop Recommendation Model
Published 2024-01-01Get full text
Article -
86
Hybrid multi‐level hardware Trojan detection platform for gate‐level netlists based on XGBoost
Published 2022-03-01Get full text
Article -
87
Correction to: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
Published 2025-02-01Get full text
Article -
88
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Published 2011-01-01Get full text
Article -
89
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
Published 2024-11-01Get full text
Article -
90
-
91
-
92
Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
Published 2021-01-01“…Many existing schemes suffer from high computational cost by using bilinear pairing operation or need the assistance of the trust authorities (TAs) during the authentication process or rely on an ideal tamper-proof device (TPD), which requires very strong security assumption. …”
Get full text
Article -
93
An efficient modified HS conjugate gradient algorithm in machine learning
Published 2024-11-01“…The Hestenes-Stiefe (HS) conjugate gradient method is very effective in resolving larger-scale sophisticated smoothing optimization tasks due to its low computational requirements and high computational efficiency. …”
Get full text
Article -
94
Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms
Published 2023-01-01“…Besides, the BA scheme uses the idea of trust domains and trust credentials to establish a master-slave connection between IoT devices. …”
Get full text
Article -
95
SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain
Published 2022-01-01“…However, most of the existing privacy‐preserving biometric authentication systems using HE assume that the server performs computations honestly. In a malicious server setting, the server may return an arbitrary result to save computational resources, resulting in a false accept/reject. …”
Get full text
Article -
96
A comprehensive evaluation of histopathology foundation models for ovarian cancer subtype classification
Published 2025-01-01Get full text
Article -
97
Model validation for a noninvasive arterial stenosis detection problem
Published 2013-12-01Get full text
Article -
98
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01“…In soldier-to-drone communication, trust-based authentication is performed using a trust-anchor approach with the public key of the Certificate Authority. …”
Get full text
Article -
99
Transfusion-Dependent Anemia in a Simultaneous Pancreas and Kidney Transplant Recipient
Published 2020-01-01Get full text
Article -
100
Differences in technical and clinical perspectives on AI validation in cancer imaging: mind the gap!
Published 2025-01-01Get full text
Article