Uniting cyber security and machine learning: Advantages, challenges and future research
Tài liệu tham khảo
Butun, 2020, Security of the internet of things: Vulnerabilities, attacks, and countermeasures, IEEE Commun. Surv. Tutor., 22, 616, 10.1109/COMST.2019.2953364
Lv, 2021, Deep-learning-enabled security issues in the internet of things, IEEE Internet Things J., 8, 9531, 10.1109/JIOT.2020.3007130
Wang, 2020, BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme, Comput. Commun., 161, 28, 10.1016/j.comcom.2020.07.012
Magaia, 2021, Industrial internet-of-things security enhanced with deep learning approaches for smart cities, IEEE Internet Things J., 8, 6393, 10.1109/JIOT.2020.3042174
Parah, 2021, Efficient security and authentication for edge-based internet of medical things, IEEE Internet Things J., 8, 15652, 10.1109/JIOT.2020.3038009
Sun, 2021, Effective malware detection scheme based on classified behavior graph in IIoT, Ad Hoc Netw., 120, 10.1016/j.adhoc.2021.102558
Yang, 2021, No-reference quality assessment for screen content images using visual edge model and AdaBoosting neural network, IEEE Trans. Image Process., 30, 6801, 10.1109/TIP.2021.3098245
Zhao, 2021, Trustworthy authorization method for security in industrial internet of things, Ad Hoc Netw., 121
Messerges, 2002, Examining smart-card security under the threat of power analysis attacks, IEEE Trans. Comput., 51, 541, 10.1109/TC.2002.1004593
Soltanian, 2016, Chapter 3 - problem solving, investigating ideas, and solutions, 33
Lei, 2019, EveDroid: Event-aware android malware detection against model degrading for IoT devices, IEEE Internet Things J., 6, 6668, 10.1109/JIOT.2019.2909745
Steinhardt, 2017, Certified defenses for data poisoning attacks, 3520
M. Aladag, F.O. Catak, E. Gul, Preventing Data Poisoning Attacks By Using Generative Models, in: 1st International Informatics and Software Engineering Conference, UBMYK, Ankara, Turkey, 2019, pp. 1–5, http://dx.doi.org/10.1109/UBMYK48245.2019.8965459.
Huang, 2021, A robust approach for privacy data protection: IoT security assurance using generative adversarial imitation learning, IEEE Internet Things J., 1
Papernot, 2016, Distillation as a defense to adversarial perturbations against deep neural networks, 582
N. Papernot, A Marauder’s Map of Security and Privacy in Machine Learning, in: 11th ACM Workshop on Artificial Intelligence and Security, Toronto, Canada, 2018.
Pirbhulal, 2020, Mobility enabled security for optimizing IoT based intelligent applications, IEEE Netw., 34, 72, 10.1109/MNET.001.1800547
Yang, 2020, Optimization of real-time traffic network assignment based on IoT data using DBN and clustering model in smart city, Future Gener. Comput. Syst., 108, 976, 10.1016/j.future.2017.12.012
Guimaraes, 2019, Intelligent network security monitoring based on optimum-path forest clustering, IEEE Netw., 33, 126, 10.1109/MNET.2018.1800151
Armando, 2005, The AVISPA tool for the automated validation of internet security protocols and applications, 281
Burrows, 1990, A logic of authentication, ACM Trans. Comput. Syst., 8, 18, 10.1145/77648.77649
M. Abdalla, P.A. Fouque, D. Pointcheval, Password-based authenticated key exchange in the three-party setting, in: 8th International Workshop on Theory and Practice in Public Key Cryptography, PKC’05, in: Lecture Notes in Computer Science, vol. 3386, Les Diablerets, Switzerland, 2005, pp. 65–84.
Kumar, 2019, A multimodal malware detection technique for android IoT devices using various features, IEEE Access, 7, 64411, 10.1109/ACCESS.2019.2916886
H.-T. Nguyen, Q.-D. Ngo, V.-H. Le, IoT Botnet Detection Approach Based on PSI graph and DGCNN classifier, in: 2018 IEEE International Conference on Information Communication and Signal Processing, ICICSP, Singapore, Singapore, 2018, pp. 118–122.
S.M. Pudukotai Dinakarrao, H. Sayadi, H.M. Makrani, C. Nowzari, S. Rafatirad, H. Homayoun, Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks, in: Design, Automation Test in Europe Conference Exhibition, DATE, Florence, Italy, 2019, pp. 776–781.
J. Su, D.V. Vasconcellos, S. Prasad, D. Sgandurra, Y. Feng, K. Sakurai, Lightweight Classification of IoT Malware Based on Image Recognition, in: IEEE 42nd Annual Computer Software and Applications Conference, Vol. 02, COMPSAC, Tokyo, Japan, 2018, pp. 664–669.
M. Jagielski, A. Oprea, B. Biggio, C. Liu, C. Nita-Rotaru, B. Li, Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning, in: IEEE Symposium on Security and Privacy, SP, San Francisco, CA, USA, 2018, pp. 19–35.
N. Peri, N. Gupta, W.R. Huang, L. Fowl, C. Zhu, S. Feizi, T. Goldstein, J.P. Dickerson, Strong Baseline Defenses Against Clean-Label Poisoning Attacks, in: ECCV Workshop, 2020, pp. 55–70.
Chen, 2021
Phong, 2018, Privacy-preserving deep learning via additively homomorphic encryption, IEEE Trans. Inf. Forensics Secur., 13, 1333, 10.1109/TIFS.2017.2787987
P. Mohassel, Y. Zhang, SecureML: A System for Scalable Privacy-Preserving Machine Learning, in: IEEE Symposium on Security and Privacy, S&P, San Jose, USA, 2017, pp. 19–38, http://dx.doi.org/10.1109/SP.2017.12.
B. Chen, W. Carvalho, N. Baracaldo, H. Ludwig, B. Edwards, T. Lee, I. Molloy, B. Srivastava, Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering, in: SafeAI@AAAI, Honolulu, USA, 2019.
Liu, 2018
Weber, 2020