Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly

The advancement of the Internet of Things (IoT) has allowed for unprecedented data collection, automation, and remote sensing and actuation, transforming autonomous systems and bringing smart command and control into numerous cyber physical systems (CPS) that our daily lives depend on. Simultaneously, dramatic improvements in machine learning and deep neural network architectures have enabled unprecedented analytical capabilities, which we see in increasingly common applications and production technologies, such as self-driving vehicles and intelligent mobile applications. Predictably, these technologies have seen rapid adoption, which has left many implementations vulnerable to threats unforeseen or undefended against. Moreover, such technologies can be used by malicious actors, and the potential for cyber threats, attacks, intrusions, and obfuscation that are only just being considered, applied, and countered. In this paper, we consider the good, the bad, and the ugly use of machine learning for cybersecurity and CPS/IoT. In detail, we consider the numerous benefits (good use) that machine learning has brought, both in general, and specifically for security and CPS/IoT, such as the improvement of intrusion detection mechanisms and decision accuracy in CPS/IoT. More pressing, we consider the vulnerabilities of machine learning (bad use) from the perspectives of security and CPS/IoT, including the ways in which machine learning systems can be compromised, misled, and subverted at all stages of the machine learning life-cycle (data collection, pre-processing, training, validation, implementation, etc.). Finally, the most concerning, a growing trend has been the utilization of machine learning in the execution of cyberattacks and intrusions (ugly use). Thus, we consider existing mechanisms with the potential to improve target acquisition and existing threat patterns, as well as those that can enable novel attacks yet to be seen.

[1]  Qingyu Yang,et al.  Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach , 2019, IEEE Access.

[2]  Giorgio Giacinto,et al.  A Pattern Recognition System for Malicious PDF Files Detection , 2012, MLDM.

[3]  Nada Golmie,et al.  A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective , 2018, IEEE Access.

[4]  Fernando Pérez-Cruz,et al.  PassGAN: A Deep Learning Approach for Password Guessing , 2017, ACNS.

[5]  Wei Yu,et al.  On effective data aggregation techniques in Host-based Intrusion Detection in MANET , 2013, CCNC.

[6]  Wei Yu,et al.  On behavior-based detection of malware on Android platform , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[7]  Nada Golmie,et al.  On Effectiveness of Smart Grid Applications Using Co-Simulation , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[8]  Nasir D. Memon,et al.  Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis , 2017, NDSS.

[9]  Fabio Roli,et al.  Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.

[10]  Yonghui Song,et al.  A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things , 2018, IEEE Internet of Things Journal.

[11]  Salvatore J. Stolfo,et al.  Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.

[12]  Bin Song,et al.  A Fast Feature Fusion Algorithm in Image Classification for Cyber Physical Systems , 2017, IEEE Access.

[13]  Ying Tan,et al.  Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.

[14]  Dawn Song,et al.  Robust Physical-World Attacks on Deep Learning Models , 2017, 1707.08945.

[15]  Yi Liang,et al.  Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.

[16]  Elie Bursztein,et al.  I am a legend: Hacking hearthstone using statistical learning methods , 2016, 2016 IEEE Conference on Computational Intelligence and Games (CIG).

[17]  Blaine Nelson,et al.  The security of machine learning , 2010, Machine Learning.

[18]  Jin Wei,et al.  Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.

[19]  Ling Liu,et al.  A Comparative Measurement Study of Deep Learning as a Service Framework , 2018, IEEE Transactions on Services Computing.

[20]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[21]  Robert C. Qiu,et al.  Q-learning based bidding algorithm for spectrum auction in cognitive radio , 2011, 2011 Proceedings of IEEE Southeastcon.

[22]  Rocco A. Servedio,et al.  Smooth boosting and learning with malicious noise , 2003 .

[23]  Fabrizio Sebastiani,et al.  Machine learning in automated text categorization , 2001, CSUR.

[24]  Ashish Sureka,et al.  Open Source Social Media Analytics for Intelligence and Security Informatics Applications , 2015, BDA.

[25]  Guobin Xu,et al.  A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures , 2016, Big Data Res..

[26]  Xinyu Yang,et al.  A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[27]  Peng Jiang,et al.  Virtual MAC Spoofing Detection through Deep Learning , 2018, 2018 IEEE International Conference on Communications (ICC).

[28]  Xinyu Yang,et al.  On data integrity attacks against optimal power flow in power grid systems , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[29]  Alexander Hofmann,et al.  On the versatility of radial basis function neural networks: A case study in the field of intrusion detection , 2010, Inf. Sci..

[30]  Xinyu Yang,et al.  A Gaussian-Mixture Model Based Detection Scheme against Data Integrity Attacks in the Smart Grid , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[31]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[32]  Chao Gao,et al.  Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.

[33]  Daniel Marquardt,et al.  Noise power spectral density estimation for binaural noise reduction exploiting direction of arrival estimates , 2017, 2017 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA).

[34]  Mohsen Guizani,et al.  Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach , 2019, Future Gener. Comput. Syst..

[35]  James P. Peerenboom,et al.  Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .

[36]  Yuval Elovici,et al.  CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning , 2019, USENIX Security Symposium.

[37]  Shitong Wang,et al.  Fuzzy DBN with rule-based knowledge representation and high interpretability , 2017, 2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE).

[38]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[39]  Boleslaw K. Szymanski,et al.  NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .

[40]  Xing Liu,et al.  Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities , 2019, IEEE Access.

[41]  Wei Yu,et al.  Tuning Deep Learning Performance for Android Malware Detection , 2018, 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[42]  Kenneth A. Loparo,et al.  Cascading Failure Attacks in the Power System: A Stochastic Game Perspective , 2017, IEEE Internet of Things Journal.

[43]  Pan Li,et al.  Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data , 2019, IEEE Transactions on Big Data.

[44]  Kilian Q. Weinberger,et al.  Marginalized Denoising Autoencoders for Domain Adaptation , 2012, ICML.

[45]  Shengwei Tian,et al.  Deep Learning in Drebin: Android malware Image Texture Median Filter Analysis and Detection , 2019, KSII Transactions on Internet and Information Systems.

[46]  Jinfeng Yi,et al.  ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.

[47]  Somesh Jha,et al.  Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.

[48]  Junhong Xu,et al.  Survey on Prediction Algorithms in Smart Homes , 2017, IEEE Internet of Things Journal.

[49]  Wei Yu,et al.  A cloud computing based architecture for cyber security situation awareness , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[50]  Wei Yu,et al.  Search Engine for the Internet of Things: Lessons From Web Search, Vision, and Opportunities , 2019, IEEE Access.

[51]  Aloysius K. Mok,et al.  Advanced Allergy Attacks: Does a Corpus Really Help? , 2007, RAID.

[52]  Nada Golmie,et al.  A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[53]  Blaine Nelson,et al.  Exploiting Machine Learning to Subvert Your Spam Filter , 2008, LEET.

[54]  Elizabeth Gibney,et al.  Google AI algorithm masters ancient game of Go , 2016, Nature.

[55]  Fan Zhang,et al.  Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.

[56]  Jun Zhu,et al.  Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[57]  Zhu Han,et al.  Machine Learning Paradigms for Next-Generation Wireless Networks , 2017, IEEE Wireless Communications.

[58]  Wei Yu,et al.  Towards Differential Privacy-Based Online Double Auction for Smart Grid , 2020, IEEE Transactions on Information Forensics and Security.

[59]  Christian Doerr,et al.  Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale , 2019, USENIX Security Symposium.

[60]  Nei Kato,et al.  The Deep Learning Vision for Heterogeneous Network Traffic Control: Proposal, Challenges, and Future Perspective , 2017, IEEE Wireless Communications.

[61]  Xinyu Yang,et al.  On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.

[62]  Zhenlong Yuan,et al.  Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.

[63]  Xinyu Yang,et al.  On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.

[64]  Hanqing Guo,et al.  Indoor Multi-Sensory Self-Supervised Autonomous Mobile Robotic Navigation , 2018, 2018 IEEE International Conference on Industrial Internet (ICII).

[65]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[66]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[67]  Calton Pu,et al.  Differentially Private Model Publishing for Deep Learning , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[68]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[69]  Pan He,et al.  Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[70]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[71]  Giorgio Giacinto,et al.  HMM-Web: A Framework for the Detection of Attacks Against Web Applications , 2009, 2009 IEEE International Conference on Communications.

[72]  Daniel Cremers,et al.  CAPTCHA Recognition with Active Deep Learning , 2015 .

[73]  Guobin Xu,et al.  Towards Online Deep Learning-Based Energy Forecasting , 2019, 2019 28th International Conference on Computer Communication and Networks (ICCCN).

[74]  Blase Ur,et al.  Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks , 2016, USENIX Annual Technical Conference.

[75]  Ursula Challita,et al.  Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial , 2017, IEEE Communications Surveys & Tutorials.

[76]  Yifan Guo,et al.  Multidimensional Time Series Anomaly Detection: A GRU-based Gaussian Mixture Variational Autoencoder Approach , 2018, ACML.

[77]  Jaime Lloret,et al.  Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things , 2017, IEEE Access.

[78]  Jay Lee,et al.  Cyber-physical Systems Architecture for Self-Aware Machines in Industry 4.0 Environment , 2015 .

[79]  Reza Shokri,et al.  Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks , 2018, ArXiv.

[80]  Ling Liu,et al.  Adversarial Examples in Deep Learning: Characterization and Divergence , 2018, ArXiv.

[81]  Nhien-An Le-Khac,et al.  Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks , 2016, FDSE.

[82]  James Newsome,et al.  Paragraph: Thwarting Signature Learning by Training Maliciously , 2006, RAID.

[83]  Elisa Bertino,et al.  Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.

[84]  Yevgeniy Vorobeychik,et al.  Adversarial Regression for Detecting Attacks in Cyber-Physical Systems , 2018, IJCAI.

[85]  Calin Belta,et al.  Anomaly detection in cyber-physical systems: A formal methods approach , 2014, 53rd IEEE Conference on Decision and Control.

[86]  Yong Wang,et al.  Learning Traffic as Images: A Deep Convolutional Neural Network for Large-Scale Transportation Network Speed Prediction , 2017, Sensors.

[87]  Wenying Wen,et al.  Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack , 2015, Multimedia Tools and Applications.

[88]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[89]  Lin Chen,et al.  Image registration based on SOFM neural network clustering , 2017, 2017 36th Chinese Control Conference (CCC).

[90]  Wei Xiang,et al.  Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.

[91]  Sheng Chen,et al.  Application of Deep Belief Networks for opcode based malware detection , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).

[92]  Wei Yu,et al.  On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.

[93]  Giovanni Vigna,et al.  Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[94]  Wenke Lee,et al.  Misleading worm signature generators using deliberate noise injection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[95]  Sherali Zeadally,et al.  Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.

[96]  Xinyu Yang,et al.  On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.

[97]  Saurabh Bagchi,et al.  TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices , 2017, IEEE Internet Computing.

[98]  Fei-Yue Wang,et al.  Traffic Flow Prediction With Big Data: A Deep Learning Approach , 2015, IEEE Transactions on Intelligent Transportation Systems.

[99]  Hassan Aljifri,et al.  IP Traceback using header compression , 2003, Comput. Secur..

[100]  Xinyu Yang,et al.  Towards Multistep Electricity Prices in Smart Grid Electricity Markets , 2016, IEEE Transactions on Parallel and Distributed Systems.

[101]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[102]  Xiaoqing Ding,et al.  Discriminative Dimensionality Reduction for Multi-Dimensional Sequences , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[103]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[104]  Andrew Kusiak,et al.  Smart manufacturing , 2018, Int. J. Prod. Res..

[105]  Nada Golmie,et al.  Toward Edge-Based Deep Learning in Industrial Internet of Things , 2020, IEEE Internet of Things Journal.

[106]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[107]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[108]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[109]  Goichiro Hanaoka,et al.  Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes , 2018, IEICE Trans. Inf. Syst..

[110]  Xinyu Yang,et al.  A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, IEEE Transactions on Computers.

[111]  Khattab M. Ali Alheeti,et al.  An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[112]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[113]  Arun Viswanathan,et al.  A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities , 2018, IEEE Access.

[114]  Jiangchuan Liu,et al.  When deep learning meets edge computing , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).

[115]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[116]  Ying Cui,et al.  2017 Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge Computing , 2017 .

[117]  Jeffrey F. Naughton,et al.  A Methodology for Formalizing Model-Inversion Attacks , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).

[118]  Cong Wang,et al.  GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning , 2018, IJCAI.

[119]  Fabio Roli,et al.  Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.

[120]  Huichen Lihuichen DECISION-BASED ADVERSARIAL ATTACKS: RELIABLE ATTACKS AGAINST BLACK-BOX MACHINE LEARNING MODELS , 2017 .

[121]  Erik Blasch,et al.  Towards Multimodal Learning for Android Malware Detection , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[122]  Hong Li,et al.  Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks , 2020, IEEE Transactions on Network Science and Engineering.

[123]  A. Keromytis,et al.  I'm Not a Human: Breaking the Google reCAPTCHA , 2016 .

[124]  Dong Yu,et al.  Deep Learning and Its Applications to Signal and Information Processing [Exploratory DSP] , 2011, IEEE Signal Processing Magazine.

[125]  Kevin Heaslip,et al.  CPS: an efficiency-motivated attack against autonomous vehicular transportation , 2013, ACSAC.

[126]  Fabio Roli,et al.  Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2018, CCS.

[127]  Lipo Wang,et al.  Deep Learning Applications in Medical Image Analysis , 2018, IEEE Access.

[128]  Xinyu Yang,et al.  A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.

[129]  William J. Buchanan,et al.  Numerical encoding to Tame SQL injection attacks , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[130]  Blaine Nelson,et al.  Poisoning Attacks against Support Vector Machines , 2012, ICML.

[131]  Nada Golmie,et al.  An integrated detection system against false data injection attacks in the Smart Grid , 2015, Secur. Commun. Networks.

[132]  Demis Hassabis,et al.  A general reinforcement learning algorithm that masters chess, shogi, and Go through self-play , 2018, Science.

[133]  Trevor Darrell,et al.  Adversarial Discriminative Domain Adaptation , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[134]  Xiaojiang Du,et al.  A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.

[135]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[136]  Ian S. Fischer,et al.  Learning to Attack: Adversarial Transformation Networks , 2018, AAAI.

[137]  Song Guo,et al.  Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT , 2018, IEEE Transactions on Emerging Topics in Computing.

[138]  Shai Ben-David,et al.  Understanding Machine Learning: From Theory to Algorithms , 2014 .

[139]  Sanming Zhou,et al.  Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[140]  Thomas Eisenbarth,et al.  SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks , 2019, USENIX Security Symposium.

[141]  Wei Yu,et al.  On statistical modeling and forecasting of energy usage in smart grid , 2014, RACS '14.

[142]  Oleg Starostenko,et al.  Breaking reCAPTCHAs with Unpredictable Collapse: Heuristic Character Segmentation and Recognition , 2012, MCPR.

[143]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[144]  Honglak Lee,et al.  Online Incremental Feature Learning with Denoising Autoencoders , 2012, AISTATS.

[145]  Xinwen Fu,et al.  Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth Systems , 2019, 2019 28th International Conference on Computer Communication and Networks (ICCCN).

[146]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[147]  Ben Y. Zhao,et al.  Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash , 2018, HT.

[148]  Xinyu Yang,et al.  Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense , 2018, IEEE Transactions on Vehicular Technology.

[149]  Qinru Qiu,et al.  A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[150]  Vinay Sudhakaran,et al.  Estimation of intersection traffic density on decentralized architectures with deep networks , 2017, 2017 International Smart Cities Conference (ISC2).

[151]  Michael Backes,et al.  Studying the Impact of Managers on Password Strength and Reuse , 2017, USENIX Security Symposium.

[152]  Sushanta Karmakar,et al.  A Neural Network based system for Intrusion Detection and attack classification , 2016, 2016 Twenty Second National Conference on Communication (NCC).

[153]  Roberto Cipolla,et al.  SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[154]  Guofei Gu,et al.  Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).

[155]  Vitaly Shmatikov,et al.  Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[156]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[157]  Ming-Yang Kao,et al.  Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[158]  Yifan Guo,et al.  A Unified Unsupervised Gaussian Mixture Variational Autoencoder for High Dimensional Outlier Detection , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[159]  Lei Liu,et al.  Combining supervised and unsupervised learning for zero-day malware detection , 2013, 2013 Proceedings IEEE INFOCOM.

[160]  Konrad Rieck,et al.  Misleading Authorship Attribution of Source Code using Adversarial Learning , 2019, USENIX Security Symposium.

[161]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[162]  Marc Peter Deisenroth,et al.  Deep Reinforcement Learning: A Brief Survey , 2017, IEEE Signal Processing Magazine.

[163]  Antonio Liotta,et al.  Big IoT data mining for real-time energy disaggregation in buildings , 2017, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[164]  Peng Liu,et al.  Towards Large-Scale Hunting for Android Negative-Day Malware , 2019, RAID.

[165]  Nada Golmie,et al.  Toward Integrating Distributed Energy Resources and Storage Devices in Smart Grid , 2017, IEEE Internet of Things Journal.

[166]  Wei Yu,et al.  A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.

[167]  Ling Huang,et al.  ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.

[168]  Debdeep Mukhopadhyay,et al.  Adversarial Attacks and Defences: A Survey , 2018, ArXiv.

[169]  Xinwen Fu,et al.  A Survey on Big Data Market: Pricing, Trading and Protection , 2018, IEEE Access.

[170]  Abhishek Dubey,et al.  Optimal detection of faulty traffic sensors used in route planning , 2017, SCOPE@CPSWeek.

[171]  Peter Corcoran,et al.  Deep Learning for Consumer Devices and Services: Pushing the limits for machine learning, artificial intelligence, and computer vision. , 2017, IEEE Consumer Electronics Magazine.