{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:30:49Z","timestamp":1774121449391,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T00:00:00Z","timestamp":1718841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T00:00:00Z","timestamp":1718841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100009392","name":"Prince Sattam bin Abdulaziz University","doi-asserted-by":"publisher","award":["PSAU\/2023\/R\/1445"],"award-info":[{"award-number":["PSAU\/2023\/R\/1445"]}],"id":[{"id":"10.13039\/100009392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s00521-024-10039-y","type":"journal-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T12:01:51Z","timestamp":1718884911000},"page":"17467-17482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Deep neural network-based secure healthcare framework"],"prefix":"10.1007","volume":"36","author":[{"given":"Abdulaziz","family":"Aldaej","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4525-0738","authenticated-orcid":false,"given":"Tariq Ahamed","family":"Ahanger","sequence":"additional","affiliation":[]},{"given":"Imdad","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,20]]},"reference":[{"key":"10039_CR1","unstructured":"Zaman S, Khandaker MR, Khan RT, Tariq F, Wong KK (2022). IEEE Access"},{"key":"10039_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0547-9","volume":"40","author":"M Bhatia","year":"2016","unstructured":"Bhatia M, Sood SK (2016) J Med Syst 40:1","journal-title":"J Med Syst"},{"key":"10039_CR3","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.future.2021.11.028","volume":"129","author":"S Singh","year":"2022","unstructured":"Singh S, Rathore S, Alfarraj O, Tolba A, Yoon B (2022) Futur Gener Comput Syst 129:380","journal-title":"Futur Gener Comput Syst"},{"key":"10039_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.compind.2017.06.009","volume":"92","author":"M Bhatia","year":"2017","unstructured":"Bhatia M, Sood SK (2017) Comput Ind 92:50","journal-title":"Comput Ind"},{"key":"10039_CR5","doi-asserted-by":"crossref","unstructured":"Raghuvanshi A, Singh UK, Joshi C (2022) Advanced healthcare systems: empowering physicians with IoT-enabled technologies pp 43\u201358","DOI":"10.1002\/9781119769293.ch4"},{"key":"10039_CR6","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.1007\/s11036-018-0991-5","volume":"24","author":"M Bhatia","year":"2019","unstructured":"Bhatia M, Sood SK (2019) Mobile Netw Appl 24:1392","journal-title":"Mobile Netw Appl"},{"issue":"9","key":"10039_CR7","doi-asserted-by":"publisher","first-page":"6415","DOI":"10.1109\/TII.2022.3143619","volume":"18","author":"S Qahtan","year":"2022","unstructured":"Qahtan S, Yatim K, Zaidan A, Alsattar H, Albahri O, Zaidan B, Alamoodi A, Zulzalil H, Osman M, Mohammed R (2022) Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems. IEEE Trans Ind Inform. 18(9):6415\u201323","journal-title":"IEEE Trans Ind Inform."},{"key":"10039_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103227","volume":"78","author":"M Bhatia","year":"2020","unstructured":"Bhatia M (2020) Microprocess Microsyst 78:103227","journal-title":"Microprocess Microsyst"},{"key":"10039_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2020.101913","volume":"107","author":"M Bhatia","year":"2020","unstructured":"Bhatia M, Kaur S, Sood SK, Behal V (2020) Artif Intell Med 107:101913","journal-title":"Artif Intell Med"},{"key":"10039_CR10","doi-asserted-by":"crossref","unstructured":"Olaniyan OT, Adetunji CO, Adeniyi MJ, Hefft DI (2022) In deep learning, machine learning and IoT in biomedical and health informatics (CRC Press, ), pp 297\u2013310","DOI":"10.1201\/9780367548445-19"},{"issue":"13","key":"10039_CR11","doi-asserted-by":"publisher","first-page":"10474","DOI":"10.1109\/JIOT.2021.3062630","volume":"8","author":"MN Bhuiyan","year":"2021","unstructured":"Bhuiyan MN, Rahman MM, Billah MM, Saha D (2021) Internet of things (IoT): a review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities. IEEE Int Things J 8(13):10474\u201398","journal-title":"IEEE Int Things J"},{"key":"10039_CR12","doi-asserted-by":"crossref","unstructured":"Torres P, Catania C, Garcia S, Garino CG (2016) An analysis of recurrent neural networks for botnet detection behavior. In: 2016 IEEE Biennial congress of Argentina (ARGENCON) (IEEE, ), pp. 1\u20136","DOI":"10.1109\/ARGENCON.2016.7585247"},{"key":"10039_CR13","doi-asserted-by":"crossref","unstructured":"Canedo J, Skjellum A (2016) In: 2016 14th annual conference on privacy, security and trust (PST) (IEEE, ), pp 219\u2013222","DOI":"10.1109\/PST.2016.7906930"},{"key":"10039_CR14","doi-asserted-by":"publisher","first-page":"32700","DOI":"10.1109\/ACCESS.2018.2846779","volume":"6","author":"MA Uddin","year":"2018","unstructured":"Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2018) IEEE Access 6:32700","journal-title":"IEEE Access"},{"issue":"4","key":"10039_CR15","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1080\/02564602.2020.1740615","volume":"38","author":"MP Uddin","year":"2021","unstructured":"Uddin MP, Mamun MA, Hossain MA (2021) IETE Tech Rev 38(4):377","journal-title":"IETE Tech Rev"},{"key":"10039_CR16","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.future.2019.10.043","volume":"104","author":"S Tuli","year":"2020","unstructured":"Tuli S, Basumatary N, Gill SS, Kahani M, Arya RC, Wander GS, Buyya R (2020) Futur Gener Comput Syst 104:187","journal-title":"Futur Gener Comput Syst"},{"key":"10039_CR17","unstructured":"Pham QV, Dev K, Maddikunta PKR, Gadekallu TR, Huynh-The T, et\u00a0al (2021) arXiv preprint arXiv:2101.00798"},{"issue":"8","key":"10039_CR18","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.3390\/s20082195","volume":"20","author":"F Jamil","year":"2020","unstructured":"Jamil F, Ahmad S, Iqbal N, Kim DH (2020) Sensors 20(8):2195","journal-title":"Sensors"},{"key":"10039_CR19","unstructured":"Alqaralleh BA, Vaiyapuri T, Parvathy VS, Gupta D, Khanna A, Shankar K (2021) Personal and ubiquitous computing pp 1\u201311"},{"key":"10039_CR20","doi-asserted-by":"crossref","unstructured":"Kakkar B, Johri P (2021) Blockchain: a healthcare perspective. In: 2021 10th International conference on system modeling and advancement in research trends (SMART) IEEE, pp 373\u2013379","DOI":"10.1109\/SMART52563.2021.9676224"},{"issue":"14","key":"10039_CR21","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala BS, Pradhan AK, Badarla V, Mohanty SP (2021) IEEE Internet Things J 8(14):11717","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"10039_CR22","first-page":"1","volume":"13","author":"A Sagu","year":"2022","unstructured":"Sagu A, Gill NS, Gulia P (2022) Hybrid deep neural network model for detection of security attacks in IoT enabled environment. Int J Adv Comput Sci Appl 13(1):1","journal-title":"Int J Adv Comput Sci Appl"},{"key":"10039_CR23","first-page":"65","volume":"1","author":"M Gorbunova","year":"2021","unstructured":"Gorbunova M, Masek P, Komarov M, Ometov A (2021) Distributed ledger technology: state-of-the-art and current challenges. Comput Sci Inform Syst 1:65\u201385","journal-title":"Comput Sci Inform Syst"},{"issue":"1","key":"10039_CR24","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1080\/20479700.2020.1843887","volume":"15","author":"M Attaran","year":"2022","unstructured":"Attaran M (2022) Int J Healthc Manag 15(1):70","journal-title":"Int J Healthc Manag"},{"issue":"2","key":"10039_CR25","doi-asserted-by":"publisher","first-page":"2321","DOI":"10.1007\/s12652-020-02346-8","volume":"12","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R (2021) J Ambient Intell Humaniz Comput 12(2):2321","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"10039_CR26","doi-asserted-by":"publisher","first-page":"339","DOI":"10.28991\/ESJ-2023-07-02-03","volume":"7","author":"A Mavrogiorgou","year":"2023","unstructured":"Mavrogiorgou A, Kiourtis A, Manias G, Symvoulidis C, Kyriazis D (2023) Emerg Sci J 7(2):339","journal-title":"Emerg Sci J"},{"issue":"3","key":"10039_CR27","doi-asserted-by":"publisher","first-page":"630","DOI":"10.28991\/HIJ-2023-04-03-012","volume":"4","author":"R Benaich","year":"2023","unstructured":"Benaich R, El Mendili S, Gahi Y (2023) HighTech Innov J 4(3):630","journal-title":"HighTech Innov J"},{"issue":"1","key":"10039_CR28","doi-asserted-by":"publisher","first-page":"134","DOI":"10.28991\/HIJ-2023-04-01-010","volume":"4","author":"S Singh","year":"2023","unstructured":"Singh S, Rosak-Szyrocka J, Tam\u00e0ndl L (2023) HighTech Innov J 4(1):134","journal-title":"HighTech Innov J"},{"key":"10039_CR29","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.procs.2021.07.053","volume":"191","author":"N Tariq","year":"2021","unstructured":"Tariq N, Khan FA, Asim M (2021) Proced Comput Sci 191:425","journal-title":"Proced Comput Sci"},{"key":"10039_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.mtcomm.2022.105222","volume":"34","author":"SK Soni","year":"2023","unstructured":"Soni SK, Manimaran D, Thomas SB, Thomas B (2023) Microstructure and mechanical characterization of Al6061 based composite and nanocomposites prepared via conventional and ultrasonic-assisted melt-stirring techniques. Mater Today Commun 34:105222","journal-title":"Mater Today Commun"},{"key":"10039_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101786","volume":"67","author":"L Lu","year":"2021","unstructured":"Lu L, Liang C, Gu D, Ma Y, Xie Y, Zhao S (2021) Technol Soc 67:101786","journal-title":"Technol Soc"},{"key":"10039_CR32","doi-asserted-by":"crossref","unstructured":"Pal K (2022) In: Prospects of blockchain technology for accelerating scientific advancement in healthcare (IGI Global, ), pp 158\u2013188","DOI":"10.4018\/978-1-7998-9606-7.ch008"},{"key":"10039_CR33","first-page":"5016809","volume":"1","author":"W Duan","year":"2022","unstructured":"Duan W, Jiang Y, Xu X, Zhang Z, Liu G (2022) An edge cloud data integrity protection scheme based on Blockchain. Secur Commun Netw 1:5016809","journal-title":"Secur Commun Netw"},{"issue":"5","key":"10039_CR34","doi-asserted-by":"publisher","first-page":"711","DOI":"10.3390\/electronics11050711","volume":"11","author":"AI Abdi","year":"2022","unstructured":"Abdi AI, Eassa FE, Jambi K, Almarhabi K, Khemakhem M, Basuhail A, Yamin M (2022) Electronics 11(5):711","journal-title":"Electronics"},{"issue":"9","key":"10039_CR35","doi-asserted-by":"publisher","first-page":"9576","DOI":"10.1007\/s11227-021-03637-3","volume":"77","author":"T Veeramakali","year":"2021","unstructured":"Veeramakali T, Siva R, Sivakumar B, Senthil Mahesh P, Krishnaraj N (2021) J Supercomput 77(9):9576","journal-title":"J Supercomput"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10039-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-10039-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10039-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T15:16:52Z","timestamp":1726672612000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-10039-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,20]]},"references-count":35,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["10039"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-10039-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,20]]},"assertion":[{"value":"29 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}