{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T01:08:20Z","timestamp":1767834500528,"version":"3.49.0"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["NSTC 111-2221-E-167-034"],"award-info":[{"award-number":["NSTC 111-2221-E-167-034"]}],"id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["NSTC 112-2221-E-167-015"],"award-info":[{"award-number":["NSTC 112-2221-E-167-015"]}],"id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Chin-Yi University of Technology","award":["NCUT 23-R-CE-009"],"award-info":[{"award-number":["NCUT 23-R-CE-009"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3351373","type":"journal-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T19:57:22Z","timestamp":1704743842000},"page":"9757-9775","source":"Crossref","is-referenced-by-count":18,"title":["Information Security and Artificial Intelligence\u2013Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1460-7116","authenticated-orcid":false,"given":"Pi-Yun","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, National Chin-Yi University of Technology, Taichung, Taiwan"}]},{"given":"Yu-Cheng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Chin-Yi University of Technology, Taichung, Taiwan"}]},{"given":"Zi-Heng","family":"Zhong","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Chin-Yi University of Technology, Taichung, Taiwan"}]},{"given":"Feng-Zhou","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Chin-Yi University of Technology, Taichung, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-7648","authenticated-orcid":false,"given":"Neng-Sheng","family":"Pai","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Chin-Yi University of Technology, Taichung, Taiwan"}]},{"given":"Chien-Ming","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Medicine, Division of Infectious Diseases, Chi Mei Medical Center, Tainan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0150-8001","authenticated-orcid":false,"given":"Chia-Hung","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Chin-Yi University of Technology, Taichung, Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7218113"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jobcr.2021.11.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BMEiCON.2014.7017404"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT52359.2021.00049"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10121415"},{"key":"ref6","volume-title":"The Working Group for WLAN Standards, Wireless\n                            Local Area Networks","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/clinchem\/hvaa200"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2196\/19104"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3346\/jkms.2020.35.e379"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-005-5164-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1136\/adc.83.1.82"},{"key":"ref12","volume-title":"Since 2018, Ransomware Attacks\n                        on Healthcare Organizations Have Cost the World Economy $92BN in\n                        Downtime Alone","year":"2023"},{"key":"ref13","volume-title":"Cybersecurity","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-818438-7.00012-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app11031329"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCAI53970.2022.9752640"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCDS53736.2022.9760971"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CALCON56258.2022.10060588"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIS56108.2023.10073869"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3288678"},{"key":"ref21","article-title":"TensorFlow: Large-scale machine learning on\n                        heterogeneous distributed systems","author":"Abadi","year":"2016","journal-title":"arXiv:1603.04467"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/app12073273"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/jpm10040211"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/mp.12763"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2020.2989737"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s22031160"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7695207"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107608"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/sil2.12089"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6615512"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/e20070535"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930183"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12651"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/app13116556"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/1\/013006"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.3259"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199215706.001.0001"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/pr10091867"},{"key":"ref39","volume-title":"An Introduction to Computer\n                        Security: The NIST Handbook","year":"2023"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/602921"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2015.0868"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3057586"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3012452"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/pr11051476"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.01.005"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0314-4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07852-2"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511622748"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3036806"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2702715"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2019.2950143"},{"key":"ref52","first-page":"1","article-title":"Fast and accurate deep network learning by\n                        exponential linear units (ELUs)","volume-title":"Proc.\n                        4th Int. Conf. Learn. Represent.","author":"Clevert"},{"key":"ref53","article-title":"Gaussian error linear units\n                    (GELUs)","author":"Hendrycks","year":"2016","journal-title":"arXiv:1606.08415"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5724-z"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962617"},{"key":"ref56","first-page":"1","article-title":"Quasi-hyperbolic momentum and Adam for deep\n                        learning","volume-title":"Proc. ICLR","author":"Ma"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.25080\/majora-92bf1922-003"},{"key":"ref58","volume-title":"Mammographic Image Analysis\n                        Society (MIAS) Database V1.21","year":"2019"},{"key":"ref59","volume-title":"Joybien Technologies","year":"2023"},{"key":"ref60","first-page":"31","article-title":"NPCR and UACI randomness tests for image\n                        encryption","volume":"1","author":"Wu","year":"2012","journal-title":"J. Sel. Areas Telecommun.\n                        (JSAT)"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3390\/tomography8050200"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/AIST55798.2022.10065355"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/bioengineering9060261"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/biomedicines10112971"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/app12188972"},{"key":"ref67","article-title":"Study on information security and breast lesion\n                        screening in an Internet of Medical Thing system: Using mammography as an\n                        example","author":"Zhang","year":"2021"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10384394.pdf?arnumber=10384394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:17:43Z","timestamp":1738387063000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10384394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3351373","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}