Securing smart manufacturing by integrating anomaly detection with zero-knowledge proofs

A Salam, M Abrar, F Amin, F Ullah, IA Khan… - IEEE …, 2024 - ieeexplore.ieee.org
In the rapidly advancing domain of smart manufacturing, securing data integrity and
preventing unauthorized access are critical challenges. This study introduces a novel …

Dual-path feature extraction based hybrid intrusion detection in IoT networks

AK Silivery, KRM Rao, R Solleti - Computers and Electrical Engineering, 2025 - Elsevier
A significant concern in the current computing industry is safeguarding Internet of Things
(IoT) networks due to the rapid rise in cyberattacks and security lapses. Previously …

Membership Inference Attacks Against Incremental Learning in IoT Devices

X Zhang, H Zhang, G Zhang, Y Yang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) devices are frequently deployed in highly dynamic environments and
need to continuously learn new classes from data streams. Incremental Learning (IL) has …

Attention-Based Hybrid Deep Learning Model for Intrusion Detection in IIoT Networks

S Ullah, W Boulila, A Koubaa, J Ahmad - Procedia Computer Science, 2024 - Elsevier
Abstract The integration of Industrial Internet of Things (IIoT) technology into the industrial
sector has produced numerous significant advantages. However, the notable concern …

An adaptive nonlinear whale optimization multi-layer perceptron cyber intrusion detection framework

H El-Ghaish, H Miqrish, A Elmogy… - International Journal of …, 2024 - Springer
The increasing prevalence of cyber threats has created a critical need for robust defense
against such incidents. Many Cyber Intrusion Detection Systems (CIDSs), utilizing machine …

Advanced Imaging Technologies With Ensemble Learning for Consumer Products Identification and Classification

R Alabdan, HK Alkahtani, KM Othman… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Consumer product recognition involves utilizing computer vision (CV) and machine learning
(ML) systems for identifying and recognizing numerous consumer goods in video or image …

Mayfly optimistic hyperelliptic curve cryptosystem

R Nava Teja Reddy, M Kavitha, GS Reddy… - Frontiers in Computer …, 2024 - frontiersin.org
Various applications use asymmetric cryptography to secure communications between both
parties, and it raises the main issue of generating vast amounts of computation and storage …

IoT network Malicious Behaviour Profiling Based on Explainable AI Using LSTM and SHAP

S Niktabe - 2024 - yorkspace.library.yorku.ca
The proliferation of IoT devices has enhanced connectivity but exposed networks to new
cyber threats, particularly from botnets. Detecting and identifying malicious data is critical for …

[PDF][PDF] A Novel Approach for Intrusion Detection System in IoT Using Correlation-Based Hybrid Feature Selection and Harris Hawk Optimization Algorithm

Y Salami, Y Ebazadeh, M Hamrang… - Journal of Optimization …, 2024 - researchgate.net
With the rapid growth of the IoT, the number of devices connected to various networks has
significantly increased. These devices generate vast amounts of data and are often …

[PDF][PDF] Mayfly optimistic hyperelliptic curve cryptosystem

RNT Reddy, M Kavitha, GS Reddy, A Yousef… - researchgate.net
Information security is important in today's world as every transaction becomes digitized. For
legal and profitable trading, integrity, confidentiality, non-reputability, and integrity of the …