Sleeping multi-armed bandit learning for fast uplink grant allocation in machine type communications
Scheduling fast uplink grant transmissions for machine type communications (MTCs) is one
of the main challenges of future wireless systems. In this paper, a novel fast uplink grant …
of the main challenges of future wireless systems. In this paper, a novel fast uplink grant …
Colonel blotto game for sensor protection in interdependent critical infrastructure
A Ferdowsi, W Saad… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Securing the physical components of a city's interdependent critical infrastructure (ICI), such
as power, natural gas, and water systems is a challenging task due to their interdependence …
as power, natural gas, and water systems is a challenging task due to their interdependence …
Face occlusion recognition with deep learning in security framework for the IoT
L Mao, F Sheng, T Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
Currently, the security of the Internet of Things (IoT) has aroused great concern. Face
detection under arbitrary occlusion has become a key problem affecting social security. This …
detection under arbitrary occlusion has become a key problem affecting social security. This …
A survey on security for IoT via machine learning
Internet of Things (IoT) is the association wherein machines like sensors, appliances are
able to talk to each other with no human involvement. These wireless sensor networks are …
able to talk to each other with no human involvement. These wireless sensor networks are …
Survey on the application of deep learning in the Internet of Things
Abstract The Internet of Things (IoT) is a network of physical instruments, software, and
sensors connected to the Internet. The IoT produces massive data, where this enormous …
sensors connected to the Internet. The IoT produces massive data, where this enormous …
Authentication of wireless devices in the Internet of Things: Learning and environmental effects
YS Dabbagh, W Saad - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Reaping the benefits of the Internet of Things (IoT) system is contingent upon developing IoT-
specific security solutions. Conventional security and authentication solutions often fail to …
specific security solutions. Conventional security and authentication solutions often fail to …
Deep Learning based Image Watermarking: A Brief Survey
The act of secretly embedding and extracting a watermark on a cover image to protect it is
known as image watermarking. In recent years, deep learning-based image watermarking …
known as image watermarking. In recent years, deep learning-based image watermarking …
Anatomized study of security solutions for multimedia: deep learning-enabled authentication, cryptography and information hiding
A Kshirsagar, M Shah - Advanced Security Solutions for …, 2021 - iopscience.iop.org
Chapter 7 deals with the security concerns of multimedia wireless networks. Wireless
networks have made possible uninterrupted connectivity with mobility. With the …
networks have made possible uninterrupted connectivity with mobility. With the …
Intrusion detection system using distributed multilevel discriminator in GAN for IoT system
M Poongodi, M Hamdi - Transactions on Emerging …, 2023 - Wiley Online Library
The artificial intelligence‐based Internet of vehicles (IoV) systems are highly susceptible to
cyber‐attacks. To reap the benefits from IoV applications, the network must be protected …
cyber‐attacks. To reap the benefits from IoV applications, the network must be protected …
A console GRID leveraged authentication and key agreement mechanism for LTE/SAE
Growing popularity of multimedia applications, pervasive connectivity, higher bandwidth,
and euphoric technology penetration among bulk of the human race that happens to be …
and euphoric technology penetration among bulk of the human race that happens to be …