Sleeping multi-armed bandit learning for fast uplink grant allocation in machine type communications

S Ali, A Ferdowsi, W Saad, N Rajatheva… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Scheduling fast uplink grant transmissions for machine type communications (MTCs) is one
of the main challenges of future wireless systems. In this paper, a novel fast uplink grant …

Colonel blotto game for sensor protection in interdependent critical infrastructure

A Ferdowsi, W Saad… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Securing the physical components of a city's interdependent critical infrastructure (ICI), such
as power, natural gas, and water systems is a challenging task due to their interdependence …

Face occlusion recognition with deep learning in security framework for the IoT

L Mao, F Sheng, T Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
Currently, the security of the Internet of Things (IoT) has aroused great concern. Face
detection under arbitrary occlusion has become a key problem affecting social security. This …

A survey on security for IoT via machine learning

S Gupta, S Vyas, KP Sharma - 2020 International conference on …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is the association wherein machines like sensors, appliances are
able to talk to each other with no human involvement. These wireless sensor networks are …

Survey on the application of deep learning in the Internet of Things

S Shadroo, AM Rahmani, A Rezaee - Telecommunication Systems, 2022 - Springer
Abstract The Internet of Things (IoT) is a network of physical instruments, software, and
sensors connected to the Internet. The IoT produces massive data, where this enormous …

Authentication of wireless devices in the Internet of Things: Learning and environmental effects

YS Dabbagh, W Saad - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Reaping the benefits of the Internet of Things (IoT) system is contingent upon developing IoT-
specific security solutions. Conventional security and authentication solutions often fail to …

Deep Learning based Image Watermarking: A Brief Survey

X Zhong, A Das, F Alrasheedi, A Tanvir - arXiv preprint arXiv:2308.04603, 2023 - arxiv.org
The act of secretly embedding and extracting a watermark on a cover image to protect it is
known as image watermarking. In recent years, deep learning-based image watermarking …

Anatomized study of security solutions for multimedia: deep learning-enabled authentication, cryptography and information hiding

A Kshirsagar, M Shah - Advanced Security Solutions for …, 2021 - iopscience.iop.org
Chapter 7 deals with the security concerns of multimedia wireless networks. Wireless
networks have made possible uninterrupted connectivity with mobility. With the …

Intrusion detection system using distributed multilevel discriminator in GAN for IoT system

M Poongodi, M Hamdi - Transactions on Emerging …, 2023 - Wiley Online Library
The artificial intelligence‐based Internet of vehicles (IoV) systems are highly susceptible to
cyber‐attacks. To reap the benefits from IoV applications, the network must be protected …

A console GRID leveraged authentication and key agreement mechanism for LTE/SAE

R Arul, G Raja, AK Bashir, J Chaudry… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Growing popularity of multimedia applications, pervasive connectivity, higher bandwidth,
and euphoric technology penetration among bulk of the human race that happens to be …