Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
In the context of autism spectrum disorder (ASD) triage, the robustness of machine learning (ML) models is a paramount concern. Ensuring the robustness of ML models faces issues such as model selection, criterion importance, trade-offs, and conflicts in the evaluation and benchmarking of ML models. Furthermore, the development of ML models must contend with two real-time scenarios: normal tests and adversarial attack cases. This study addresses this challenge by integrating three key phases that bridge the domains of machine learning and fuzzy multicriteria decision-making (MCDM). First, the utilized dataset comprises authentic information, encompassing 19 medical and sociodemographic features from 1296 autistic patients who received autism diagnoses via the intelligent triage method. These patients were categorized into one of three triage labels: urgent, moderate, or minor. We employ principal component analysis (PCA) and two algorithms to fuse a large number of dataset features. Second, this fused dataset forms the basis for rigorously testing eight ML models, considering normal and adversarial attack scenarios, and evaluating classifier performance using nine metrics. The third phase developed a robust decision-making framework that encompasses the creation of a decision matrix (DM) and the development of the 2-tuple linguistic Fermatean fuzzy decision by opinion score method (2TLFFDOSM) for benchmarking multiple-ML models from normal and adversarial perspectives, accomplished through individual and external group aggregation of ranks. Our findings highlight the effectiveness of PCA algorithms, yielding 12 principal components with acceptable variance. In the external ranking, logistic regression (LR) emerged as the top-performing ML model in terms of the 2TLFFDOSM score (1.3370). A comparative analysis with five benchmark studies demonstrated the superior performance of our framework across all six checklist comparison points.
In the context of autism spectrum disorder (ASD) triage, the robustness of machine learning (ML) models is a paramount concern. Ensuring the robustness of ML models faces issues such as model selection, criterion importance, trade-offs, and conflicts in the evaluation and benchmarking of ML models. Furthermore, the development of ML models must contend with two real-time scenarios: normal tests and adversarial attack cases. This study addresses this challenge by integrating three key phases that bridge the domains of machine learning and fuzzy multicriteria decision-making (MCDM). First, the utilized dataset comprises authentic information, encompassing 19 medical and sociodemographic features from 1296 autistic patients who received autism diagnoses via the intelligent triage method. These patients were categorized into one of three triage labels: urgent, moderate, or minor. We employ principal component analysis (PCA) and two algorithms to fuse a large number of dataset features. Second, this fused dataset forms the basis for rigorously testing eight ML models, considering normal and adversarial attack scenarios, and evaluating classifier performance using nine metrics. The third phase developed a robust decision-making framework that encompasses the creation of a decision matrix (DM) and the development of the 2-tuple linguistic Fermatean fuzzy decision by opinion score method (2TLFFDOSM) for benchmarking multiple-ML models from normal and adversarial perspectives, accomplished through individual and external group aggregation of ranks. Our findings highlight the effectiveness of PCA algorithms, yielding 12 principal components with acceptable variance. In the external ranking, logistic regression (LR) emerged as the top-performing ML model in terms of the 2TLFFDOSM score (1.3370). A comparative analysis with five benchmark studies demonstrated the superior performance of our framework across all six checklist comparison points.
This study aims to perform a thorough systematic review investigating and synthesizing existing research on defense strategies and methodologies in adversarial attacks using machine learning (ML) and deep learning methods. A methodology was conducted to guarantee a thorough literature analysis of the studies using sources such as ScienceDirect, Scopus, IEEE Xplore, and Web of Science. A question was shaped to retrieve articles published from 2019 to April 2024, which ultimately produced a total of 704 papers. A rigorous screening, deduplication, and matching of the inclusion and exclusion criteria were followed, and hence 42 studies were included in the quantitative synthesis. The considered papers were categorized into a coherent and systematic classification including three categories: security enhancement techniques, adversarial attack strategies and defense mechanisms, and innovative security mechanisms and solutions. In this article, we have presented a systematic and comprehensive analysis of earlier studies and opened the door to potential future studies by discussing in depth four challenges and motivations of adversarial attacks, while three recommendations have been discussed. A systematic science mapping analysis was also performed to reorganize and summarize the results of studies to address the issues of trustworthiness. Moreover, this research covers a large variety of network and cybersecurity applications of defense in adversarial attack subjects, including intrusion detection systems, anomaly detection, ML-based defenses, and cryptographic techniques. The relevant conclusions well demonstrate what have achieved in defense mechanisms against adversarial attacks. In addition, the analysis revealed a few emerging tendencies and deficiencies in the area to be remedied through better and more dependable mitigation methods against advanced persistent threats. The findings of this review have crucial implications for the community of researchers, practitioners, and policy makers in network and cybersecurity using artificial intelligence applications.
In automated systems, biometric systems can be used for efficient and unique identification and authentication of individuals without requiring users to carry or remember any physical tokens or passwords. Biometric systems are a rapidly developing and promising technology domain. in contrasting with conventional methods like password IDs. Biometrics refer to biological measures or physical traits that can be employed to identify and authenticate individuals. The motivation to employ brain activity as a biometric identifier in automatic identification systems has increased substantially in recent years. with a specific focus on data obtained through electroencephalography (EEG). Numerous investigations have revealed the existence of discriminative characteristics in brain signals captured during different types of cognitive tasks. However, because of their high dimensional and nonstationary properties, EEG signals are inherently complex, which means that both feature extraction and classification methods must take this into consideration. In this study, a hybridization method that combined a classical classifier with a pre-trained convolutional neural network (CNN) and the short-time Fourier transform (STFT) spectrum was employed. For tasks such as subject identification and lock and unlock classification, we employed a hybrid model in mobile biometric authentication to decode two-class motor imagery (MI) signals. This was accomplished by building nine distinct hybrid models using nine potential classifiers, primarily classification algorithms, from which the best one was finally selected. The experimental portion of this study involved, in practice, six experiments. For biometric authentication tasks, the first experiment tries to create a hybrid model. In order to accomplish this, nine hybrid models were constructed using nine potential classifiers, which are largely classification methods. Comparing the RF-VGG19 model to other models, it is evident that the former performed better. As a result, it was chosen as the method for mobile biometric authentication. The performance RF-VGG19 model is validated using the second experiment. The third experiment attempts for verifying the RF-VGG19 model's performance. The fourth experiment performs the lock and unlock classification process with an average accuracy of 91.0% using the RF-VGG19 model. The fifth experiment was performed to verify the accuracy and effectiveness of the RF-VGG19 model in performing the lock and unlock task. The mean accuracy achieved was 94.40%. Validating the RF-VGG19 model for the lock and unlock task using a different dataset (unseen data) was the goal of the sixth experiment, which achieved an accuracy of 92.8%. This indicates the hybrid model assesses the left and right hands' ability to decode the MI signal. Consequently, The RF-VGG19 model can aid the BCI-MI community by simplifying the implementation of the mobile biometric authentication requirement, specifically in subject identification and lock and unlock classification.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.