过去一年中添加的文章,按日期排序

Improving Privacy in Federated Learning-Based Intrusion Detection for IoT Networks

L Syne, P Caballero-Gil… - … of the 39th ACM/SIGAPP …, 2024 - dl.acm.org
83 天前 - … However, current protocols face challenges such as high … as keeping data secure
during the training of distributed … , thwarting potent inference attacks while still facilitating the …

AE‐Integrated: Real‐time network intrusion detection with Apache Kafka and autoencoder

K Roshan, A Zafar - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
151 天前 - … , machine learning and deep learning-based network … its prediction accuracy for
future inference. The simulation study … In this research study, the slack platform automates tasks

[HTML][HTML] Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning

J Li, MS Othman, H Chen, LM Yusuf - Journal of Big Data, 2024 - Springer
206 天前 - … detection in machine learning-based attack classification … tasks, we choose following
five classic machine learning … also explore model training and inference times to evaluate …

Investigating Security and Privacy Concerns in Deep-Learning-based Pervasive Health Monitoring Architectures

A Boulemtafes, A Amira, MS Derki… - … and Intelligent Systems …, 2023 - ieeexplore.ieee.org
249 天前 - … It discusses through an illustrative DL-based PHM architecture the potential … and
attacks during the inference and training phases, and identifies key security and privacy issues. …

[图书][B] Computer Safety, Reliability, and Security: 42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20–22, 2023, Proceedings

J Guiochet, S Tonetta, F Bitsch - 2023 - books.google.com
294 天前 - … Each submitted article was single-blind reviewed by at least three independent
reviewers; the decision on the conference program was jointly taken during the International …

Unlocking adversarial transferability: a security threat towards deep learning-based surveillance systems via black box inference attack-a case study on face mask …

BUH Sheikh, A Zafar - Multimedia Tools and Applications, 2024 - Springer
324 天前 - … learning (DL) and machine learning (ML) algorithms have … to adversarial attacks,
which pose a significant challenge to … that the training dataset is available during the attack, we …