4
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Federated Learning Approach for Secured Medical Recommendation in Internet of Medical Things Using Homomorphic Encryption

      Read this article at

      ScienceOpenPublisherPubMed
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references16

          • Record: found
          • Abstract: not found
          • Article: not found

          Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            SecureBoost: A Lossless Federated Learning Framework

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems

              The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides many researchers have applied machine learning around this area. Obviously, a single classifier alone in the classifications seems impossible to control network intruders. This limitation is what led us to perform dimensionality reduction by means of correlation-based feature selection approach (CFS approach) in addition to a refined ensemble model. The paper aims to improve the Intrusion Detection System (IDS) by proposing a CFS + Ensemble Classifiers (Bagging and Adaboost) which has high accuracy, high packet detection rate, and low false alarm rate. Machine Learning Ensemble Models with base classifiers (J48, Random Forest, and Reptree) were built. Binary classification, as well as Multiclass classification for KDD99 and NSLKDD datasets, was done while all the attacks were named as an anomaly and normal traffic. Class labels consisted of five major attacks, namely Denial of Service (DoS), Probe, User-to-Root (U2R), Root to Local attacks (R2L), and Normal class attacks. Results from the experiment showed that our proposed model produces 0 false alarm rate (FAR) and 99.90% detection rate (DR) for the KDD99 dataset, and 0.5% FAR and 98.60% DR for NSLKDD dataset when working with 6 and 13 selected features.
                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                (View ORCID Profile)
                Journal
                IEEE Journal of Biomedical and Health Informatics
                IEEE J. Biomed. Health Inform.
                Institute of Electrical and Electronics Engineers (IEEE)
                2168-2194
                2168-2208
                June 2024
                June 2024
                : 28
                : 6
                : 3329-3340
                Affiliations
                [1 ]Wittenborg University of Applied Sciences, Brinklaan 268, Apeldoorn, Netherlands
                [2 ]Computer Science Department, Jiangsu University, Zhenjiang, China
                [3 ]Information Security Engineering Technology, Abu Dhabi Polytechnic, Abu Dhabi, United Arab Emirates
                [4 ]Department of Computer Science, Swansea University, Swansea, U.K.
                Article
                10.1109/JBHI.2024.3350232
                38190666
                d04734a5-dd0f-45eb-9c95-aa3543eeef55
                © 2024

                https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html

                https://doi.org/10.15223/policy-029

                https://doi.org/10.15223/policy-037

                History

                Comments

                Comment on this article