{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:45:50Z","timestamp":1751093150892,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,19]]},"DOI":"10.1109\/biocas58349.2023.10388581","type":"proceedings-article","created":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T18:27:59Z","timestamp":1705602479000},"page":"1-5","source":"Crossref","is-referenced-by-count":6,"title":["Cyber-Immunity at the Core: Securing Biomedical Devices through Hardware-Level Machine Learning Defense"],"prefix":"10.1109","author":[{"given":"Hossein","family":"Sayadi","sequence":"first","affiliation":[{"name":"California State University,Department of Computer Engineering and Computer Science,Long Beach,CA,USA"}]},{"given":"Zhangying","family":"He","sequence":"additional","affiliation":[{"name":"California State University,Department of Computer Engineering and Computer Science,Long Beach,CA,USA"}]},{"given":"Chelsea William","family":"Fernandes","sequence":"additional","affiliation":[{"name":"California State University,Department of Computer Engineering and Computer Science,Long Beach,CA,USA"}]},{"given":"Tahereh","family":"Miari","sequence":"additional","affiliation":[{"name":"Claremont Graduate University,Center for Information Systems and Technology,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.03.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1509961"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2147\/MDER.S50048"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1089\/hs.2019.0123"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011919"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465828"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407585"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3233\/THC-161263"},{"article-title":"Medical device cybersecurity: What you need to know","year":"2020","author":"Food","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715080"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD56317.2022.00042"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424330"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkq1019"},{"issue":"11","key":"ref20","first-page":"1523","article-title":"BioMart: A Data Federation Framework for Large Collaborative Projects","volume":"23","author":"Haider","year":"2007","journal-title":"Bioinformatics"},{"article-title":"virusshare.com","year":"2023","author":"Roberts","key":"ref21"},{"key":"ref22","article-title":"VirusTotal"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2015.7095802"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1201\/9781315181080"},{"volume-title":"Feature engineering for machine learning: principles and techniques for data scientists.","year":"2018","author":"Zheng","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00011"},{"article-title":"Scikit-learn: Machine learning in python","year":"2018","author":"Pedregosa","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"}],"event":{"name":"2023 IEEE Biomedical Circuits and Systems Conference (BioCAS)","start":{"date-parts":[[2023,10,19]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2023,10,21]]}},"container-title":["2023 IEEE Biomedical Circuits and Systems Conference (BioCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10388488\/10388438\/10388581.pdf?arnumber=10388581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T18:32:48Z","timestamp":1705689168000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10388581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,19]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/biocas58349.2023.10388581","relation":{},"subject":[],"published":{"date-parts":[[2023,10,19]]}}}