3,420
Views
11
CrossRef citations to date
0
Altmetric
Advanced Security on Software and Systems

Secure medical digital twin via human-centric interaction and cyber vulnerability resilience

&
Pages 895-910 | Received 22 Sep 2021, Accepted 15 Nov 2021, Published online: 13 Dec 2021

References

  • Ahamad, S. S., & Pathan, A. S. K. (2021). A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic. Connection Science, 33(3), 532–554. https://doi.org/10.1080/09540091.2020.1854180
  • Boden, M. A. (2017). Is deep dreaming the new collage?. Connection Science, 29(4), 268–275. https://doi.org/10.1080/09540091.2017.1345855
  • Boejen, A., & Grau, C. (2011). Virtual reality in radiation therapy training. Surgical Oncology-oxford, 20(3), 185–188. https://doi.org/10.1016/j.suronc.2010.07.004
  • Burrer, S. L., de Perio, M. A., Hughes, M. M., Kuhar, D. T., & Luckhaupt, S. E., Covid, C., Team, R., COVID, C., Team, R., COVID, C., Team, R. (2020). Characteristics of health care personnel with COVID-19–United States, February 12–April 9, 2020. Morbidity and Mortality Weekly Report, 69(15), 477–481. https://doi.org/10.15585/mmwr.mm6915e6
  • Cao, Z., Zhou, Y., Yang, A., & Peng, S. (2021). Deep transfer learning mechanism for fine-grained cross-domain sentiment classification. Connection Science, 33(4), 911–928. https://doi.org/10.1080/09540091.2021.1912711
  • Chen, X., Li, C., Wang, D., Wen, S., Zhang, J., Nepal, S., Xiang, Y., & Ren, K. (2020). Android HIV: A study of repackaging malware for evading machine-learning detection. IEEE Transactions on Information Forensics and Security, 15, 987–1001. https://doi.org/10.1109/TIFS.10206
  • Coogan, C., & He, B. (2018). Brain-Computer interface control in a virtual reality environment and applications for the internet of things. IEEE Access, 6, 10840–10849. https://doi.org/10.1109/ACCESS.2018.2809453
  • Corral-Acero, J., Margara, F., Marciniak, M., Rodero, C., Loncaric, F., Feng, Y., Gilbert, A., Fernandes, J. F., Bukhari, H. A., Wajdan, A., & Martinez, M. V. (2020). The digital twin to enable the vision of precision cardiology. European Heart Journal, 41(48), 4556–4564. https://doi.org/10.1093/eurheartj/ehaa159
  • Coulter, R., Han, Q. L., Pan, L., Zhang, J., & Xiang, Y. (2020a). Code analysis for intelligent cyber systems: A data-Driven approach. Information Sciences, 50(7), 3081–3093. https://doi.org/10.1016/j.ins.2020.03.036
  • Coulter, R., Han, Q. L., Pan, L., Zhang, J., & Xiang, Y. (2020b). Data-driven cyber security in perspective–intelligent traffic analysis. IEEE Transactions on Cybernetics, 50(7), 3081–3093. https://doi.org/10.1109/TCYB.6221036
  • Delp, S. L., Loan, J. P., Hoy, M. G., Zajac, F. E., Topp, E. L., & Rosen, J. M. (1990). An interactive graphics-based model of the lower extremity to study orthopaedic surgical procedures. IEEE Transactions on Biomedical Engineering, 37(8), 757–767. https://doi.org/10.1109/10.102791
  • Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., Shou, L., Qin, B., Liu, T., Jiang, D., & Zhou, M. (2020). Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155.
  • Fu, K., Kohno, T., Lopresti, D., Mynatt, E., Nahrstedt, K., Patel, S., Richardson, D., & Zorn, B. (2017). Safety, security, and privacy threats posed by accelerating trends in the internet of things. Computing Community Consortium (CCC) Technical Report, 29(3), 1–9. arXiv:2008.00017
  • Hamet, P., & Tremblay, J. (2017). Artificial intelligence in medicine. Metabolism, 69(3), S36–S40. https://doi.org/10.1016/j.metabol.2017.01.011
  • Hu, J., Liang, W., Hosam, O., Hsieh, M. Y., & Su, X. (2021). 5GSS: A framework for 5G-secure-smart healthcare monitoring. Connection Science, 1–23. https://doi.org/10.1080/09540091.2021.1977243
  • Li, Z., Zou, D., Xu, S., Jin, H., Qi, H., & Hu, J. (2016). VulPecker: An automated vulnerability detection system based on code similarity analysis. In Proceedings of the 32nd ACCSA (pp. 201–213). Springer International Publishing.
  • Lin, G., Wen, S., Han, Q., Zhang, J., & Xiang, Y. (2020). Software vulnerability detection using deep neural networks: A survey. Proceedings of the IEEE, 108(10), 1825–1848. https://doi.org/10.1109/PROC.5
  • Lin, G., Xiao, W., Zhang, J., & Xiang, Y. (2019). Deep learning-based vulnerable function detection: A benchmark. In Proceedings of the International Conference on Information and Communications Security (pp. 219–232). Springer International Publishing.
  • Lin, G., Zhang, J., Luo, W., Pan, L., De Vel, O., Montague, P., & Xiang, Y. (2021). Software vulnerability discovery via learning multi-domain knowledge bases. IEEE Transactions on Dependable and Secure Computing, 18(5), 2469–2485. https://doi.org/10.1109/TDSC.2019.2954088
  • Lin, G., Zhang, J., Luo, W., Pan, L., & Xiang, Y. (2017). POSTER: Vulnerability discovery with function representation learning from unlabeled projects. In Proceedings of the 2017 Sigsac Conference on CCS (pp. 2539–2541). Springer International Publishing.
  • Lin, G., Zhang, J., Luo, W., Pan, L., Xiang, Y., De Vel, O., & Montague, P. (2018). Cross-project transfer representation learning for vulnerable function discovery. IEEE Transactions on Industrial Informatics, 14(7), 3289–3297. https://doi.org/10.1109/TII.2018.2821768
  • Liu, L., De Vel, O. Y., Han, Q., Zhang, J., & Xiang, Y. (2018). Detecting and preventing cyber insider threats: A survey. IEEE Communications Surveys & Tutorials, 20(2), 1397–1417. https://doi.org/10.1109/COMST.2018.2800740
  • Liu, S., Lin, G., Han, Q. L., Wen, S., Zhang, J., & Xiang, Y. (2019). DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection. IEEE Transactions on Fuzzy Systems, 28(7), 1329–1343. https://doi.org/10.1109/TFUZZ.2019.2958558
  • Liu, W., Hu, E. W., Su, B., & Wang, J. (2021). Using machine learning techniques for DSP software performance prediction at source code level. Connection Science, 33(1), 26–41. https://doi.org/10.1080/09540091.2020.1762542
  • Miao, Y., Chen, C., Pan, L., Han, Q. L., Zhang, J., & Xiang, Y. (2022). Machine learning based cyber attacks targeting on controlled information: A survey. ACM Computing Survey, 54(7), 136:1–136:36. https://doi.org/10.1145/3465171
  • Qiu, J., Zhang, J., Pan, L., Luo, W., Nepal, S., & Xiang, Y. (2021). A survey of android malware detection with deep neural models. ACM Computing Survey, 53(6), 126:1–126:36. https://doi.org/10.1145/3417978
  • Ramsundar, B., & Zadeh, R. B. (2018). Tensorflow for deep learning: from linear regression to reinforcement learning. O'Reilly Media, Inc.
  • Ratcliffe, J., Soave, F., Bryan-Kinns, N., Tokarchuk, L., & Farkhatdinov, I. (2021). Extended Reality (XR) remote research: A survey of drawbacks and opportunities. In Proceedings of the 2021 Chi Conference on Human Factors in Computing Systems (pp. 1–13). Springer International Publishing.
  • Saad, W., Bennis, M., & Chen, M. (2019). A vision of 6G wireless systems: Applications, trends, technologies, and open research problems. IEEE Network, 34(3), 134–142. https://doi.org/10.1109/MNET.65
  • Samsung (2020). 6G, the next hyper connected experience for all (Technical Report).
  • Sethuraman, S. C., Vijayakumar, V., & Walczak, S. (2020). Cyber attacks on healthcare devices using unmanned aerial vehicles. Journal of Medical Systems, 44(1), 1–10. https://doi.org/10.1007/s10916-019-1489-9
  • Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L. Y., & Xiang, Y. (2019). Data-driven cybersecurity incident prediction: A survey. IEEE Communications Surveys and Tutorials, 21(2), 1744–1772. 10.1109/COMST.2018.2885561.
  • Ting, D. S. W., Carin, L., Dzau, V., & Wong, T. Y. (2020). Digital technology and COVID-19. Nature Medicine, 26(4), 459–461. https://doi.org/10.1038/s41591-020-0824-5
  • Topol, E. J. (2019). High-performance medicine: The convergence of human and artificial intelligence. Nature Medicine, 25(1), 44–56. https://doi.org/10.1038/s41591-018-0300-7
  • Veronesi, G., Novellis, P., Voulaz, E., & Alloisio, M. (2016). Robot-assisted surgery for lung cancer: State of the art and perspectives. Lung Cancer (Amsterdam, Netherlands), 101(5), 28–34. https://doi.org/10.1016/j.lungcan.2016.09.004
  • Villanueva, C., Xiong, J., & Rajput, S. (2020). Simulation-based surgical education in cardiothoracic training. ANZ Journal of Surgery, 90(6), 978–983. https://doi.org/10.1111/ans.v90.6
  • Wang, M., Zhu, T., Zhang, T., Zhang, J., Yu, S., & Zhou, W. (2020). Security and privacy in 6G networks: New areas and new challenges. Digital Communications and Networks, 6(3), 281–291. https://doi.org/10.1016/j.dcan.2020.07.003
  • Wu, F., Wang, J., Liu, J., & Wang, W. (2017). Vulnerability detection with deep learning. In Proceedings of the 3rd IEEE International Conference on Computer and Communications (ICCC) (pp. 1298–1302). Springer International Publishing.
  • Xie, Y., Ji, L., Li, L., Guo, Z., & Baker, T. (2021). An adaptive defense mechanism to prevent advanced persistent threats. Connection Science, 33(2), 359–379. https://doi.org/10.1080/09540091.2020.1832960
  • Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258. https://doi.org/10.1109/JIOT.2017.2694844
  • Zhang, J., Li, L., Lin, G., Fang, D., Tai, Y., & Huang, J. (2020). Cyber resilience in healthcare digital twin on lung cancer. IEEE Access, 8, 201900–201913. https://doi.org/10.1109/ACCESS.2020.3034324
  • Zhang, J., Pan, L., Han, Q.-L., Chen, C., Wen, S., & Xiang, Y. (2021). Deep learning based attack detection for cyber-physical system cybersecurity: A survey. IEEE/CAA Journal of Automatica Sinica. https://doi.org/10.1109/JAS.2021.1004261