Physical layer key generation scheme for MIMO system based on feature fusion autoencoder
Y Chen, Z Chen, Y Zhang, Z Luo, Y Li… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Recently, the use of wireless channel state information (CSI) to generate encryption keys in
the physical layer has gained significant attention from researchers. Unlike classical …
the physical layer has gained significant attention from researchers. Unlike classical …
Differentially private federated learningfor anomaly detection in ehealth networks
Increasing number of ubiquitous devices are being used in the medical field to collect
patient information. Those connected sensors can potentially be exploited by third parties …
patient information. Those connected sensors can potentially be exploited by third parties …
Trust based intrusion detection system to detect insider attacks in IoT systems
IoT systems are vulnerable to various cyber attacks as they form a subset of the Internet.
Insider attacks find more significance since many devices are configured to access the …
Insider attacks find more significance since many devices are configured to access the …
Breaching the defense: Investigating fgsm and ctgan adversarial attacks on iec 60870-5-104 ai-enabled intrusion detection systems
DC Asimopoulos, P Radoglou-Grammatikis… - Proceedings of the 18th …, 2023 - dl.acm.org
In the digital age of the hyper-connected Critical Infrastructures (CIs), the role of the smart
electrical grid is crucial, providing several benefits, such as improved grid resilience, efficient …
electrical grid is crucial, providing several benefits, such as improved grid resilience, efficient …
Not just another Internet of Things taxonomy: A method for validation of taxonomies
X Mountrouidou, B Billings, L Mejia-Ricart - Internet of Things, 2019 - Elsevier
Abstract The Internet of Things (IoT) is a fast-evolving ecosystem. As with any new and
popular technology, it includes important design details that need to be refined, such as the …
popular technology, it includes important design details that need to be refined, such as the …
Anomaly Detection for Cyber Internet of Things Attacks: A Systematic Review
From past few years, the Internet of things (IoT) is an emerging and encouraging technology
that has gained prominence in the industries. Due to its increasing usages, a huge amount …
that has gained prominence in the industries. Due to its increasing usages, a huge amount …
Blockchain-based federation of wireless sensor nodes
FJ Haro-Olmo, JA Alvarez-Bermejo… - The Journal of …, 2021 - Springer
Wireless sensor networks (WSNs), as an integral part of most Internet of Things (IoT)
devices, are currently proliferating providing a new paradigm of emerging technologies. It is …
devices, are currently proliferating providing a new paradigm of emerging technologies. It is …
Robotic arm: impact on industrial and domestic applications
N Chahal, R Bisht, AK Rana… - … Sciences: A Multi and …, 2023 - Wiley Online Library
Industrial robotic arms help organizations gain a competitive advantage and reduce costs by
automating important activities that contribute to worker safety, faster production, and higher …
automating important activities that contribute to worker safety, faster production, and higher …
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
MR Alagheband, A Mashatan - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) is increasingly becoming widespread in different areas
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …
Efficient deep learning based detector for electricity theft generation system attacks in smart grid
This paper investigates the problem of electricity theft attacks in the generation domain. In
this attack, the adversaries aim to manipulate readings to claim higher energy injected into …
this attack, the adversaries aim to manipulate readings to claim higher energy injected into …