Feedback

X
Computational Methods for Medical and Cyber Security

Computational Methods for Medical and Cyber Security

1 Ungluer has Faved this Work
Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 33 times via unglue.it ebook links.
  1. 33 - pdf (CC BY) at Unglue.it.

Keywords

  • a survey
  • academic performance
  • adversarial machine learning
  • ANOVA
  • behavioural finance
  • big data frameworks
  • blockchain
  • browser security
  • Cloud computing
  • Clustering
  • cognitive bias
  • comparative analysis
  • Computational models
  • convolutional neural networks
  • cyber-attacks
  • cyber-security
  • cybersecurity
  • data communication
  • Data science
  • Database
  • deep learning
  • DeepLabV3plus
  • distributed frameworks
  • distributed ledger
  • Educational data mining
  • electronic health record
  • Environment
  • explainable machine learning
  • Fault tolerance
  • financial technology
  • FinTech
  • Flink
  • Hadoop
  • HL7
  • Hyperledger Composer
  • identity management
  • imbalanced datasets
  • intelligent tutoring system
  • Internet of Things
  • investor’s profile
  • Learning analytics
  • Machine learning
  • machine translation
  • medical image segmentation
  • medical services
  • metaheuristics
  • Natural Language Processing
  • password security
  • phishing detection
  • RAFT
  • RegTech
  • Samza
  • SE block
  • Secondary Education
  • Social media
  • Social sciences
  • Spark
  • SPSS
  • stock market
  • storm
  • stream processing systems
  • student field forecasting
  • supervised learning
  • Teheran Stock Exchange
  • text-to-SQL
  • transfer learning
  • u-net
  • unsupervised learning
  • website phishing

Links

DOI: 10.3390/books978-3-0365-5115-9

Editions

edition cover

Share

Copy/paste this into your site: