A survey on digital twin for industrial internet of things: Applications, technologies and tools

H Xu, J Wu, Q Pan, X Guan… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Digital twin for the industrial Internet of Things (DT-IIoT) creates a high-fidelity, fine-grained,
low-cost digital replica of the cyber-physical integrated Internet for industry. Powered by …

A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

A novel architectural framework on IoT ecosystem, security aspects and mechanisms: a comprehensive survey

M Bouzidi, N Gupta, FA Cheikh, A Shalaginov… - IEEE …, 2022 - ieeexplore.ieee.org
For the past few years, the Internet of Things (IoT) technology continues to not only gain
popularity and importance, but also witnesses the true realization of everything being smart …

Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks

XG Guo, BQ Wang, JL Wang, CK Ahn, ZG Wu - Information Sciences, 2023 - Elsevier
This study investigates the secure and privacy-preserving consensus problem for a class of
Lipschitz nonlinear multiagent systems (MASs) under undirected topology and multiple …

Packet header compression: A principle-based survey of standards and recent research studies

M Tömösközi, M Reisslein… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Many emerging communication applications transmit packets with small payloads, yet
require rich metadata context for the proper functioning of the various involved protocol …

{SMACK}: Semantically Meaningful Adversarial Audio Attack

Z Yu, Y Chang, N Zhang, C Xiao - 32nd USENIX Security Symposium …, 2023 - usenix.org
Voice controllable systems rely on speech recognition and speaker identification as the key
enabling technologies. While they bring revolutionary changes to our daily lives, their …

When evil calls: Targeted adversarial voice over ip network

H Liu, Z Yu, M Zha, XF Wang, W Yeoh… - Proceedings of the …, 2022 - dl.acm.org
As the COVID-19 pandemic fundamentally reshaped the remote life and working styles,
Voice over IP (VoIP) telephony and video conferencing have become a primary method of …

Antifake: Using adversarial audio to prevent unauthorized speech synthesis

Z Yu, S Zhai, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The rapid development of deep neural networks and generative AI has catalyzed growth in
realistic speech synthesis. While this technology has great potential to improve lives, it also …

{ARI}: Attestation of Real-time Mission Execution Integrity

J Wang, Y Wang, A Li, Y Xiao, R Zhang, W Lou… - 32nd USENIX Security …, 2023 - usenix.org
With the proliferation of autonomous safety-critical cyber-physical systems (CPS) in our daily
life, their security is becoming ever more important. Remote attestation is a powerful …

Detection of stealthy jamming for UAV-assisted wireless communications: An HMM-based method

C Zhang, L Zhang, T Mao, Z Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Due to the high mobility, low cost and high robustness of line-of-sight (LoS) channels,
unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless …