A survey of machine and deep learning methods for internet of things (IoT) security

MA Al-Garadi, A Mohamed, AK Al-Ali… - … surveys & tutorials, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) integrates billions of smart devices that can communicate with
one another with minimal human intervention. IoT is one of the fastest developing fields in …

Deep reinforcement learning for cyber security

TT Nguyen, VJ Reddi - IEEE Transactions on Neural Networks …, 2021 - ieeexplore.ieee.org
The scale of Internet-connected systems has increased considerably, and these systems are
being exposed to cyberattacks more than ever. The complexity and dynamics of …

IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?

L Xiao, X Wan, X Lu, Y Zhang… - IEEE Signal Processing …, 2018 - ieeexplore.ieee.org
The Internet of things (IoT), which integrates a variety of devices into networks to provide
advanced and intelligent services, has to protect user privacy and address attacks such as …

The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges

M Waqas, S Tu, Z Halim, SU Rehman, G Abbas… - Artificial Intelligence …, 2022 - Springer
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …

Role of machine learning and deep learning in securing 5G-driven industrial IoT applications

P Sharma, S Jain, S Gupta, V Chamola - Ad Hoc Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …

Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges

P Anand, Y Singh, A Selwal, M Alazab, S Tanwar… - IEEE …, 2020 - ieeexplore.ieee.org
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …

PHY-layer spoofing detection with reinforcement learning in wireless networks

L Xiao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …

Security in mobile edge caching with reinforcement learning

L Xiao, X Wan, C Dai, X Du, X Chen… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
Mobile edge computing usually uses caching to support multimedia contents in 5G mobile
Internet to reduce the computing overhead and latency. Mobile edge caching (MEC) …

Reinforcement learning-based NOMA power allocation in the presence of smart jamming

L Xiao, Y Li, C Dai, H Dai… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Nonorthogonal multiple access (NOMA) systems are vulnerable to jamming attacks,
especially smart jammers who apply programmable and smart radio devices such as …