55 results match your criteria: "Center for Cybersecurity[Affiliation]"

Introduction: The rapid escalation of cyber threats necessitates innovative strategies to enhance cybersecurity and privacy measures. Artificial Intelligence (AI) has emerged as a promising tool poised to enhance the effectiveness of cybersecurity strategies by offering advanced capabilities for intrusion detection, malware classification, and privacy preservation. However, this work addresses the significant lack of a comprehensive synthesis of AI's use in cybersecurity and privacy across the vast literature, aiming to identify existing gaps and guide further progress.

View Article and Find Full Text PDF

Menstrual hygiene management among girls in rural India poses a substantial challenge for public health, education, and quality of life, exacerbated by limited access and affordability of menstrual products. In response to these issues, the Government of India initiated the Menstrual Hygiene Scheme (MHS) to enhance access and awareness. This study evaluates the impact of the MHS in Assam and Tripura designated" treatment states" with consistent pad supply from 2017 to 2021 compared to neighboring" control states" with negligible pad distribution.

View Article and Find Full Text PDF

MemberShield: A framework for federated learning with membership privacy.

Neural Netw

January 2025

Universitat Rovira i Virgili, Dept. of Computer Engineering and Mathematics, CYBERCAT-Center for Cybersecurity Research of Catalonia, Av. Països Catalans 26, 43007 Tarragona, Catalonia, Spain. Electronic address:

Federated Learning (FL) allows multiple data owners to build high-quality deep learning models collaboratively, by sharing only model updates and keeping data on their premises. Even though FL offers privacy-by-design, it is vulnerable to membership inference attacks (MIA), where an adversary tries to determine whether a sample was included in the training data. Existing defenses against MIA cannot offer meaningful privacy protection without significantly hampering the model's utility and causing a non-negligible training overhead.

View Article and Find Full Text PDF

The predominant use of disposable, non-organic menstrual products has significant environmental impacts due to waste and resource depletion. Concerns over the environmental, economic, and health implications of menstrual hygiene management (MHM) have highlighted the need to explore sustainable options like reusable sanitary pads (RSPs). Despite their benefits, the adoption of RSPs is limited by a lack of awareness, availability, cost, and research.

View Article and Find Full Text PDF

Intrusion detection systems have proliferated with varying capabilities for data generation and learning towards detecting abnormal behavior. The goal of green intrusion detection systems is to design intrusion detection systems for energy efficiency, taking into account the resource constraints of embedded devices and analyzing energy-performance-security trade-offs. Towards this goal, we provide a comprehensive survey of existing green intrusion detection systems and analyze their effectiveness in terms of performance, overhead, and energy consumption for a wide variety of low-power embedded systems such as the Internet of Things (IoT) and cyber physical systems.

View Article and Find Full Text PDF

The counterfactual framework in Jarmin et al. is not a measure of disclosure risk of respondents.

Proc Natl Acad Sci U S A

March 2024

Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, United Nations Educational, Scientific and Cultural Organization Chair in Data Privacy, CYBERCAT-Center for Cybersecurity Research of Catalonia, Tarragona, Catalonia E-43007, Spain.

View Article and Find Full Text PDF

In the digital age, where information is a cornerstone for decision-making, social media's not-so-regulated environment has intensified the prevalence of fake news, with significant implications for both individuals and societies. This study employs a bibliometric analysis of a large corpus of 9678 publications spanning 2013-2022 to scrutinize the evolution of fake news research, identifying leading authors, institutions, and nations. Three thematic clusters emerge: Disinformation in social media, COVID-19-induced infodemics, and techno-scientific advancements in auto-detection.

View Article and Find Full Text PDF

The Darkweb, part of the deep web, can be accessed only through specialized computer software and used for illegal activities such as cybercrime, drug trafficking, and exploitation. Technological advancements like Tor, bitcoin, and cryptocurrencies allow criminals to carry out these activities anonymously, leading to increased use of the Darkweb. At the same time, computers have become an integral part of our daily lives, shaping our behavior, and influencing how we interact with each other and the world.

View Article and Find Full Text PDF
Article Synopsis
  • The study discusses traditional machine learning methods used in surgery and highlights the need to adapt to new techniques in light of big data.
  • The objective is to analyze the current and future use of machine learning for applications like risk assessment and decision-making in surgical practices.
  • With advancements in technology, including electronic health records and AI, it's crucial for surgeons to understand the capabilities and limitations of these new methodologies to improve patient care.
View Article and Find Full Text PDF

LFighter: Defending against the label-flipping attack in federated learning.

Neural Netw

February 2024

Universitat Rovira i Virgili, Department of Computer Engineering and Mathematics, CYBERCAT Center for Cybersecurity Research of Catalonia, UNESCO Chair in Data Privacy, Av. Països Catalans 26, E-43007 Tarragona, Catalonia. Electronic address:

Article Synopsis
  • Federated learning (FL) allows peers to collaboratively develop machine learning models while keeping their data private, but this autonomy can lead to malicious activities like label-flipping (LF) attacks, which are targeted attempts to disrupt model training by altering data labels.
  • The LF attack is difficult to detect and has detrimental effects on the model's performance, and existing defensive methods have limitations based on data distribution or struggle with complex models.
  • The paper introduces LFighter, a new defense mechanism that identifies and mitigates LF attacks by analyzing parameter gradients from local updates, demonstrating superior effectiveness in accuracy and stability compared to current defenses, supported by empirical results across various datasets.
View Article and Find Full Text PDF

Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical and digital domains is crucial for unlocking the full potential of the IIoT, and digital twins can facilitate this integration by providing a virtual representation of real-world entities.

Objectives: By combining digital twins with the IIoT, industries can simulate, predict, and control physical behaviors, enabling them to achieve broader value and support industry 4.

View Article and Find Full Text PDF

In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years, these schemes still suffer from security vulnerabilities exploited by the attackers. One severe physical attack is the node capture attack, which allows adversaries to compromise the security of the entire scheme.

View Article and Find Full Text PDF

Exploring the Clinical Translation of Generative Models Like ChatGPT: Promise and Pitfalls in Radiology, From Patients to Population Health.

J Am Coll Radiol

September 2023

Director, University of Maryland Medical Intelligent Imaging (UM2ii) Center, Baltimore, Maryland; Vice Chair, Society of Imaging Informatics in Medicine Program Planning Committee; Associate Editor, Radiology: Artificial Intelligence. Electronic address: https://twitter.com/PaulYiMD.

Generative artificial intelligence (AI) tools such as GPT-4, and the chatbot interface ChatGPT, show promise for a variety of applications in radiology and health care. However, like other AI tools, ChatGPT has limitations and potential pitfalls that must be considered before adopting it for teaching, clinical practice, and beyond. We summarize five major emerging use cases for ChatGPT and generative AI in radiology across the levels of increasing data complexity, along with pitfalls associated with each.

View Article and Find Full Text PDF

Exploiting Radio Frequency Identification (RFID) technology in healthcare systems has become a common practice, as it ensures better patient care and safety. However, these systems are prone to security vulnerabilities that can jeopardize patient privacy and the secure management of patient credentials. This paper aims to advance state-of-the-art approaches by developing more secure and private RFID-based healthcare systems.

View Article and Find Full Text PDF

Challenges in cybersecurity: Lessons from biological defense systems.

Math Biosci

August 2023

Department of Electrical and Computer Engineering, University of Texas, Austin, TX 78712, United States of America.

Defending against novel, repeated, or unpredictable attacks, while avoiding attacks on the 'self', are the central problems of both mammalian immune systems and computer systems. Both systems have been studied in great detail, but with little exchange of information across the different disciplines. Here, we present a conceptual framework for structured comparisons across the fields of biological immunity and cybersecurity, by framing the context of defense, considering different (combinations of) defensive strategies, and evaluating defensive performance.

View Article and Find Full Text PDF

Laboratory education is essential for enhancing both the understanding of concepts and skills of students. A significant barrier to excelling in laboratory practices relates to a lack of self-efficacy. Being complementary to mainstream theoretical learning, the contribution of laboratory education to impart knowledge and hands-on proficiency is often under-represented.

View Article and Find Full Text PDF

Background: Frailty is frequently used by clinicians to help determine surgical outcomes. The frailty index, which represents the frequency of frailty indicators present in an individual, is one method for evaluating patient frailty to predict surgical outcomes. However, the frailty index treats all indicators of frailty that are used in the index as equivalent.

View Article and Find Full Text PDF

A significant study has been undertaken in the areas of health care and administration of cutting-edge artificial intelligence (AI) technologies throughout the previous decade. Healthcare professionals studied smart gadgets and other medical technologies, along with the AI-based Internet of Things (IoT) (AIoT). Connecting the two regions makes sense in terms of improving care for rural and isolated resident individuals.

View Article and Find Full Text PDF

Ali-Bey - an open collaborative georeferencing web application.

Biodivers Data J

April 2022

Museu de Ciències Naturals de Barcelona, Barcelona, Spain Museu de Ciències Naturals de Barcelona Barcelona Spain.

Background: Georeferencing preserved specimens represents a major effort at the Museu de Ciències Naturals de Barcelona (MCNB), given the available resources and limited staff that can be allocated to the task. Georeferencing is a labour-intensive and hard-to-automate task that requires software tools that can help in making it as efficient as possible. The tool we present, Ali-Bey, has been slowly developed over 15 years and its functionalities have been gradually built in a process of development, testing, use in production and refinement, rather than as a single development cycle out of a comprehensive specifications requirement document.

View Article and Find Full Text PDF

In recent years, massive development in the malware industry changed the entire landscape for malware development. Therefore, cybercriminals became more sophisticated by advancing their development techniques from file-based to fileless malware. As file-based malware depends on files to spread itself, on the other hand, fileless malware does not require a traditional file system and uses benign processes to carry out its malicious intent.

View Article and Find Full Text PDF

Fair detection of poisoning attacks in federated learning on non-i.i.d. data.

Data Min Knowl Discov

January 2023

Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, CYBERCAT-Center for Cybersecurity Research of Catalonia, UNESCO Chair in Data Privacy, Av. Països Catalans 26, 43007 Tarragona, Catalonia, Spain.

Article Synopsis
  • Federated learning (FL) is a decentralized machine learning approach that enhances privacy by allowing clients to train models on their own data without sharing it, but it faces risks such as malicious clients submitting harmful updates (poisoning).
  • Poisoning detection methods can inadvertently discriminate against minority groups by misclassifying their legitimate data as malicious, which can lead to unfair models that fail to represent diverse knowledge in the training data.
  • This research aims to balance the need for poisoning detection with the inclusion of diverse client data, demonstrating that their proposed method results in more accurate models compared to existing techniques, particularly in scenarios where data is not uniform across clients.
View Article and Find Full Text PDF

Longitudinal study of teacher acceptance of mobile virtual labs.

Educ Inf Technol (Dordr)

December 2022

Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, 690525 Kerala India.

Synthesizing the advancements in technology with classroom practices depends considerably on teachers acceptance of such internet and communication technology (ICT) tools. Adequate teacher training and upgrading of their IT skills are not prioritized in developing economies leading to poor adoption of emerging technology assisted pedagogic interventions. This paper investigated the underlying characteristics of teachers acceptance of mobile friendly virtual laboratories (M-VLs) as part of a longitudinal study conducted over 5 years covering both pre-pandemic and pandemic periods.

View Article and Find Full Text PDF

Smart cities assure the masses a higher quality of life through digital interconnectivity, leading to increased efficiency and accessibility in cities. In addition, a huge amount of data is being exchanged through smart devices, networks, cloud infrastructure, big data analysis and Internet of Things (IoT) applications in the various private and public sectors, such as critical infrastructures, financial sectors, healthcare, and Small and Medium Enterprises (SMEs). However, these sectors require maintaining certain security mechanisms to ensure the confidentiality and integrity of personal and critical information.

View Article and Find Full Text PDF

An increase in adolescent social media use has exacerbated cyberbullying globally. Instagram has the highest percentage of adolescent users experiencing cybervictimisation. While past research has delved into self-driven or peer-driven motivations of cyberbullying, theory-driven research characterising external factors is integral to understanding the psyche of cyberbullies, victims, or bystanders.

View Article and Find Full Text PDF