Machine learning-based methods for enhancement of uav-noma and d2d cooperative networks

L Tsipi, M Karavolos, PS Bithas, D Vouyioukas - Sensors, 2023 - mdpi.com
The cooperative aerial and device-to-device (D2D) networks employing non-orthogonal
multiple access (NOMA) are expected to play an essential role in next-generation wireless …

Towards real-time deep learning-based network intrusion detection on FPGA

L Le Jeune, T Goedemé, N Mentens - … Cloud S&P, SCI, SecMT, and SiMLA …, 2021 - Springer
Traditionally, network intrusion detection systems identify attacks based on signatures, rules,
events or anomaly detection. More and more research investigates the application of deep …

An efficient SDN architecture for smart home security accelerated by FPGA

H Gordon, C Park, B Tushir, Y Liu… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
With the rise of Internet of Things (IoT) devices, home network management and security are
becoming complex. There is an urgent requirement to make smart home network …

Intrusion detection for network based on elite clone artificial bee colony and back propagation neural network

G Qi, J Zhou, W Jia, M Liu, S Zhang… - … and Mobile Computing, 2021 - Wiley Online Library
With the rapid development of Internet technology, network attacks have become more
frequent and complex, and intrusion detection has also played an increasingly important …

Bi-Level Resilient Control Solution for Distributed Feeder Automation System Under Hybrid Attack

R Zeng, Y Li, S Hu, J Liu, H Wu, J Chen… - … on Smart Grid, 2024 - ieeexplore.ieee.org
Distributed feeder automation system (DFAs), as a promising protection technology for
power distribution system (PDS) with distributed generation, its vulnerability to cyberattacks …

Unification of K-Nearest Neighbor (KNN) with Distance Aware Algorithm for Intrusion Detection in Evolving Networks Like IoT

SK Lakshminarayana, PI Basarkod - Wireless Personal Communications, 2023 - Springer
Abstract The Internet of Things and cyber physical systems are emerging networks that
enable several additional layers of services to improve various facets of human life. The risk …

Feature dimensionality in CNN acceleration for high-throughput network intrusion detection

L Le Jeune, T Goedemé… - 2022 32nd International …, 2022 - ieeexplore.ieee.org
With the ever increasing need for better cybersecurity, and due to the continuous growth of
network traffic bandwidths, there is a continuous pursuit of faster and smarter network …

Mimic encryption box for network multimedia data security

X Zhou, B Li, Y Qi, W Dong - Security and Communication …, 2020 - Wiley Online Library
With the rapid development of the Internet, the security of network multimedia data has
attracted increasingly more attention. The moving target defense (MTD) and cyber mimic …

An open source custom k-means generator for aws cloud fpga accelerators

L Bragança, M Canesche, J Penha… - 2021 XI Brazilian …, 2021 - ieeexplore.ieee.org
Nowadays, FPGAs play an essential role in domain-specific hardware accelerators due to
their power efficiency and flexibility. Nevertheless, FPGA programming and deploying are …

Abnormal Electricity Consumption Detection Method for Smart Grid Using Fusion Matrix Completion and Improved Clustering Algorithm

N Zhang, L Zhu - IEEE Access, 2024 - ieeexplore.ieee.org
With the application and development of new technologies such as the Internet of Things
and big data in the energy field, smart grids have gradually become the main trend for the …