From: Vision transformer architecture and applications in digital health: a tutorial and survey
Method
Application
Jigsaw block-based encryption [96]
Data encryption
MFVT [97]
Anomaly detection
Image conversion from network data-flow [98]
Network intrusion system detection
Zero-shot face [99]
Anti-spoofing
Backdoor defender [100]
Patch processing