Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems
J Liu, M Nogueira, J Fernandes… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Machine Learning (ML) models are susceptible to adversarial samples that appear as
normal samples but have some imperceptible noise added to them with the intention of …
normal samples but have some imperceptible noise added to them with the intention of …
Smart applications in edge computing: Overview on authentication and data security
As a new computing paradigm, edge computing has appeared in the public field of vision
recently. Owing to its advantages of low delay and fast response, edge computing has …
recently. Owing to its advantages of low delay and fast response, edge computing has …
Intrusion detection in Edge-of-Things computing
AS Almogren - Journal of Parallel and Distributed Computing, 2020 - Elsevier
Abstract Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …
[图书][B] New dimensions of information warfare
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …
that facilitated our everyday tasks. Over the years, new technologies have continually …
A novel framework design of network intrusion detection based on machine learning techniques
C Zhang, Y Chen, Y Meng, F Ruan… - Security and …, 2021 - Wiley Online Library
Traditional machine learning‐based intrusion detection often only considers a single
algorithm to identify intrusion data, lack of the flexibility method, low detection rate, no …
algorithm to identify intrusion data, lack of the flexibility method, low detection rate, no …
Intelligent intrusion detection algorithm based on multi-attack for edge-assisted internet of things
S Shitharth, GB Mohammed, J Ramasamy… - Security and Risk …, 2023 - Springer
The security concerns surrounding edge computing have been in the forefront as the
technology has become increasingly popular. There is a larger need to move computations …
technology has become increasingly popular. There is a larger need to move computations …
[HTML][HTML] Edge intelligence for network intrusion prevention in IoT ecosystem
Abstract The Internet of Things (IoT) platform allows physical devices to connect directly to
the internet and upload data continuously. Insecure access makes IoT platforms vulnerable …
the internet and upload data continuously. Insecure access makes IoT platforms vulnerable …
Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things
YK Saheed - Artificial Intelligence for Cloud and Edge Computing, 2022 - Springer
Edge computing (EC) is a computing methodology that is distributed in nature that brings
data storage and computation closer to the place where it is to be used to accelerate …
data storage and computation closer to the place where it is to be used to accelerate …
[HTML][HTML] A novel, low computational complexity, parallel swarm algorithm for application in low-energy devices
In this work, we propose a novel metaheuristic algorithm that evolved from a conventional
particle swarm optimization (PSO) algorithm for application in miniaturized devices and …
particle swarm optimization (PSO) algorithm for application in miniaturized devices and …
Microservice pre-deployment based on mobility prediction and service composition in edge
As an emerging computing paradigm, mobile edge computing (MEC) is receiving growing
attention. In MEC, user requests on software applications are firstly sent to edge servers for …
attention. In MEC, user requests on software applications are firstly sent to edge servers for …