Deep learning applications in the Internet of Things: a review, tools, and future directions

P Raoufi, A Hemmati, AM Rahmani - Evolutionary Intelligence, 2024 - Springer
The emergence of the Internet of Things (IoT) has enabled the proliferation of interconnected
devices and sensors, generating vast amounts of often complex and unstructured data …

Two-Phase Dual-Adversarial Agents With Multivariate Information for Unsupervised Anomaly Detection of IIoT-Edge Devices

Y Chang, J Chen, R Su, J Xie… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With the improvement of intelligence and integration, automatic supervision of large-scale
systems is a current challenge in guaranteeing the high-reliability of edge devices. Hence …

[HTML][HTML] A self-learning algorithm for identifying the leverage points in soil data using quantile regression forests

S Rose, S Nickolas, SM Sunoj, S Sangeetha - Decision Analytics Journal, 2024 - Elsevier
Some unusual combinations of predictor values in multivariate regression often influence
tampering with the output, and filtering those observations becomes the trickiest and most …

Abnormal driving behavior detection based on an improved ant colony algorithm

X Huang, P Yun, S Wu, Z Hu - Applied Artificial Intelligence, 2023 - Taylor & Francis
As one of the most serious hazards in the world, more than 80% of traffic accidents are
caused by driver misconduct. The detection of abnormal behavior of drivers is important to …

GBDT-IL: Incremental Learning of Gradient Boosting Decision Trees to Detect Botnets in Internet of Things

R Chen, T Dai, Y Zhang, Y Zhu, X Liu, E Zhao - Sensors, 2024 - mdpi.com
The rapid development of the Internet of Things (IoT) has brought many conveniences to our
daily life. However, it has also introduced various security risks that need to be addressed …

Artificial intelligence in industrial Internet of Things: A concise review of performance management

S Balta Kaç, S Eken - … Conference on Computing, Intelligence and Data …, 2023 - Springer
The success of the IoT applications in the field of Information Technologies has led to its
spread to different areas of use. In this study, the performance management of …

Top Cyber Threats: The Rise of Ransomware

A Djenna, M Belaoued, N Lifa - IFIP International Conference on …, 2024 - Springer
Ransomware stands out as a particularly malicious type of cyberattack, wielding the
potential to inflict severe financial, operational, and reputational harm. The insidious nature …

An Analysis Of Anomaly Detection Techniques for IoT Devices: A Review

S Bindra, A Malik - 2023 Third International Conference on …, 2023 - ieeexplore.ieee.org
There is an increasing demand for effective intrusion detection systems to protect the privacy
and security of IoT devices and the data they collect and transmit. IoT devices are …

Integration of cloud, iot, and ai for smart services

A Behura, A Singh, S Nayak - Fostering Cross-Industry Sustainability …, 2024 - igi-global.com
This chapter focused on providing the latest knowledge about IoT with prominence on
application issues, intelligent sensors, enabling technologies, communication technology …

Anomaly Detection Algorithm of Industrial Internet of Things Data Platform Based on Deep Learning

X Li, C Xie, Z Zhao, C Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The development of the Internet of Things (IoT) causes most industrial applications to utilize
IoT devices to improve their productivity. Applications such as smart cities, energy …