98%
921
2 minutes
20
Epileptic seizure detection has undergone progressive advancements since its conception in the 1970s. From proof-of-concept experiments in the latter part of that decade, it has now become a vibrant area of clinical and laboratory research. In an effort to bring this technology closer to practical application in human patients, this study introduces a customized approach to selecting electroencephalogram (EEG) features and electrode positions for seizure prediction. The focus is on identifying precursors that occur within 10 min of the onset of abnormal electrical activity during a seizure. However, there are security concerns related to safeguarding patient EEG recordings against unauthorized access and network-based attacks. Therefore, there is an urgent need for an efficient prediction and classification method for encrypted EEG data. This paper presents an effective system for analyzing and recognizing encrypted EEG information using Arnold transform algorithms, chaotic mapping, and convolutional neural networks (CNNs). In this system, the EEG time series from each channel is converted into a 2D spectrogram image, which is then encrypted using chaotic algorithms. The encrypted data is subsequently processed by CNNs coupled with transfer learning (TL) frameworks. To optimize the fusion parameters of the ensemble learning classifiers, a hybridized spoofing optimization method is developed by combining the characteristics of corvid and gregarious-seeking agents. The evaluation of the model's effectiveness yielded the following results: 98.9 ± 0.3% accuracy, 98.2 ± 0.7% sensitivity, 98.6 ± 0.6% specificity, 98.6 ± 0.6% precision, and an F1 measure of 98.9 ± 0.6%. When compared with other state-of-the-art techniques applied to the same dataset, this novel strategy demonstrated one of the most effective seizure detection systems, as evidenced by these results.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10650532 | PMC |
http://dx.doi.org/10.3390/diagnostics13213382 | DOI Listing |
Sci Rep
August 2025
Department of Electrical Engineering, Indian Institute of Technology Delhi, New Delhi, India.
In the era of digital healthcare, accurate and secure 3D visualization of medical data is critical for collaborative surgical planning. Traditional centralized systems suffer from security vulnerabilities and lack of depth cues necessary for accurate visualization of complex anatomy. We present a decentralized Extended Reality (XR)-based framework integrating a Hybrid Biometric Cryptosystem (HBC), hierarchical redactable blockchain, and InterPlanetary File System (IPFS)-based storage to address these limitations.
View Article and Find Full Text PDFSci Rep
May 2025
Department of Computer Engineering, College of Computer and Information Sciences, Majmaah University, Majmaah, Saudi Arabia.
The Internet of Vehicles (IoV) has emerged as a transformative technology for intelligent transportation systems, enabling real-time communication between vehicles, infrastructure and external networks. However, this connectivity also introduces significant cybersecurity risks, such as spoofing, injection and denial of service (DoS) attacks, which threaten operational safety and system reliability. To address these challenges, this study proposes the adaptive CNN-based intrusion detection system (ACIDS), a robust and scalable framework designed to enhance intrusion detection in IoV environments.
View Article and Find Full Text PDFSensors (Basel)
April 2025
Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid 22110, Jordan.
The dependency of Unmanned Aerial Vehicles (UAVs), also known as drones, on off-board data, such as control and position data, makes them highly susceptible to serious safety and security threats, including data interceptions, Global Positioning System (GPS) jamming, and spoofing attacks. This indeed necessitates the existence of an Intrusion Detection System (IDS) in place to detect potential security threats/intrusions promptly. Recently, machine-learning-based IDSs have gained popularity due to their high performance in detecting known as well as novel cyber-attacks.
View Article and Find Full Text PDFPeerJ Comput Sci
March 2025
School of Computer Science and Engineering, Yeungnam University, Gyeongsan-si, Republic of Korea.
Uncrewed Aerial Vehicles (UAVs) are frequently utilized in several domains such as transportation, distribution, monitoring, and aviation. A significant security vulnerability is the Global Positioning System (GPS) Spoofing attack, wherein the assailant deceives the GPS receiver by transmitting counterfeit signals, thereby gaining control of the UAV. This can result in the UAV being captured or, in certain instances, destroyed.
View Article and Find Full Text PDFPeerJ Comput Sci
October 2024
Department of Management Information Systems, College of Business Administration, Prince Sattam Bin Abdulaziz University, Al-Kharj, Riyadh, Saudi Arabia.
This research tackles the critical challenge of BeiDou signal spoofing in vehicular ad-hoc networks and addresses significant risks to vehicular safety and traffic management stemming from increased reliance on accurate satellite navigation. The study proposes a novel hybrid machine learning framework that integrates Autoencoders and long short-term memory (LSTM) networks with an advanced cryptographic method, attribute-based encryption, to enhance the detection and mitigation of spoofing attacks. Our methodology leverages both real-time and synthetic navigational data in a comprehensive experimental setup that simulates various spoofing scenarios to test the resilience of the proposed system.
View Article and Find Full Text PDF