[HTML][HTML] Adversarial machine learning in industry: A systematic literature review
Abstract Adversarial Machine Learning (AML) discusses the act of attacking and defending
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …
Big data resource management & networks: Taxonomy, survey, and future directions
FM Awaysheh, M Alazab, S Garg… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Big Data (BD) platforms have a long tradition of leveraging trends and technologies from the
broader computer network and communication community. For several years, dedicated …
broader computer network and communication community. For several years, dedicated …
Machine learning schemes for anomaly detection in solar power plants
The rapid industrial growth in solar energy is gaining increasing interest in renewable power
from smart grids and plants. Anomaly detection in photovoltaic (PV) systems is a demanding …
from smart grids and plants. Anomaly detection in photovoltaic (PV) systems is a demanding …
A comprehensive study on the role of machine learning in 5G security: challenges, technologies, and solutions
Fifth-generation (5G) mobile networks have already marked their presence globally,
revolutionizing entertainment, business, healthcare, and other domains. While this leap …
revolutionizing entertainment, business, healthcare, and other domains. While this leap …
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions
VR Kebande, AI Awad - ACM Computing Surveys, 2024 - dl.acm.org
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …
revolution, which is projected to continue accelerating and realizing digital transformations …
A comprehensive collection and analysis model for the drone forensics field
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be
applied to several purposes, especially in smart cities. These involve traffic observation …
applied to several purposes, especially in smart cities. These involve traffic observation …
Assert: A blockchain-based architectural approach for engineering secure self-adaptive iot systems
Internet of Things (IoT) systems are complex systems that can manage mission-critical,
costly operations or the collection, storage, and processing of sensitive data. Therefore …
costly operations or the collection, storage, and processing of sensitive data. Therefore …
A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles
Continuous and emerging advances in Information and Communication Technology (ICT)
have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines …
have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines …
Fedcsd: A federated learning based approach for code-smell detection
Software quality is critical, as low quality, or “Code smell,” increases technical debt and
maintenance costs. There is a timely need for a collaborative model that detects and …
maintenance costs. There is a timely need for a collaborative model that detects and …
From the cloud to the edge towards a distributed and light weight secure big data pipelines for iot applications
FM Awaysheh - Trust, security and privacy for big data, 2022 - taylorfrancis.com
Part of the broader development of Internet-of-Things (IoT) architecture for intelligent
environments is the developing of sophisticated Edge communications that support the …
environments is the developing of sophisticated Edge communications that support the …