Security and Privacy in IoT Using Machine Learning and Blockchain
暂无分享,去创建一个
[1] William H. Press,et al. Numerical recipes in C (2nd ed.): the art of scientific computing , 1992 .
[2] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[3] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.
[4] Charles Elkan,et al. Differential Privacy and Machine Learning: a Survey and Review , 2014, ArXiv.
[5] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[6] Takehisa Yairi,et al. Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction , 2014, MLSDA'14.
[7] Xiangjian He,et al. Detection of Denial-of-Service Attacks Based on Computer Vision Techniques , 2015, IEEE Transactions on Computers.
[8] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[9] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[10] Miroslaw Malek,et al. A Friend or a Foe? Detecting Malware using Memory and CPU Features , 2016, SECRYPT.
[11] Salil S. Kanhere,et al. Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.
[12] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[13] Jong-Hyouk Lee,et al. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment , 2016, The Journal of Supercomputing.
[14] Je-Won Kang,et al. A Novel Intrusion Detection Method Using Deep Neural Network for In-Vehicle Network Security , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).
[15] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[16] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[17] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[18] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[19] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[20] Ning Wang,et al. Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.
[21] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[22] Yutao Ma,et al. Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey , 2017, IEEE Network.
[23] Xiaoxia Liu,et al. Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM , 2017, IEEE Journal of Biomedical and Health Informatics.
[24] Ilias Politis,et al. Enhancing SDN security for IoT-related deployments through blockchain , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
[25] Young-Sik Jeong,et al. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.
[26] N. Kshetri. Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .
[27] Guillaume Chapron,et al. The environment needs cryptogovernance , 2017, Nature.
[28] Yan Zhang,et al. Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.
[29] Beng Chin Ooi,et al. BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.
[30] Jian Weng,et al. Machine Learning-Based Malicious Application Detection of Android , 2017, IEEE Access.
[31] Ahmet M. Kondoz,et al. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption , 2017, 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[32] Sachin Shetty,et al. Towards data assurance and resilience in IoT using blockchain , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[33] Yuval Elovici,et al. CIoTA: Collaborative IoT Anomaly Detection via Blockchain , 2018, ArXiv.
[34] Tiago M. Fernández-Caramés,et al. A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.
[35] Richa Singh,et al. Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks , 2018, AAAI.
[36] Shreyas Sen,et al. RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[37] S. Mercy Shalinie,et al. Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.
[38] Xiangliang Zhang,et al. CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.
[39] Yidong Li,et al. DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features , 2018, IEEE Access.
[40] Francesco Longo,et al. Blockchain-Based IoT-Cloud Authorization and Delegation , 2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP).
[41] Naveen K. Chilamkurti,et al. Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications , 2018, IEEE Communications Magazine.
[42] Richa Singh,et al. Are Image-Agnostic Universal Adversarial Perturbations for Face Recognition Difficult to Detect? , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[43] Madeline Carr,et al. Standardising a moving target: The development and evolution of IoT security standards , 2018, IoT 2018.
[44] Pin Lv,et al. BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation , 2018, IEEE Access.
[45] Antonio Puliafito,et al. Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.
[46] Liang Xiao,et al. Secure Mobile Crowdsensing with Deep Learning , 2018, ArXiv.
[47] PRADIP KUMAR SHARMA,et al. A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.
[48] Wei Cai,et al. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.
[49] Jianfeng Ma,et al. A Novel Dynamic Android Malware Detection System With Ensemble Learning , 2018, IEEE Access.
[50] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[51] Aloknath De,et al. Continuous Security in IoT Using Blockchain , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[52] Jeffrey D. Tew,et al. The applicability of blockchain in the Internet of Things , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).
[53] Jong-Hyouk Lee,et al. BIDaaS: Blockchain Based ID As a Service , 2018, IEEE Access.
[54] Gang Qu,et al. A Privacy-Preserving Trust Model Based on Blockchain for VANETs , 2018, IEEE Access.
[55] Youakim Badr,et al. Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions , 2018, Sensors.
[56] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[57] Mohammed Anbar,et al. Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection , 2018, Lecture Notes in Electrical Engineering.
[58] Antônio Augusto Fröhlich,et al. IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain , 2018, 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC).
[59] Debdeep Mukhopadhyay,et al. Adversarial Attacks and Defences: A Survey , 2018, ArXiv.
[60] Ke Xiao,et al. A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.
[61] Liyuan Liu,et al. Deep learning approach for cyberattack detection , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[62] Jun Li,et al. Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.
[63] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[64] Tommaso Melodia,et al. Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking , 2018, IEEE Internet of Things Journal.
[65] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.
[66] Richa Singh,et al. SmartBox: Benchmarking Adversarial Detection and Mitigation Algorithms for Face Recognition , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[67] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[68] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[69] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[70] Qi Xia,et al. GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid , 2018, IEEE Access.
[71] Jemal H. Abawajy,et al. Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.
[72] Khaled Salah,et al. Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters , 2018, IEEE Access.
[73] Quanyan Zhu,et al. Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[74] Rui Guo,et al. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.
[75] Yue Wang,et al. Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G , 2017, IET Commun..
[76] Yury Yanovich,et al. Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare , 2015, Oncotarget.
[77] Manuel Díaz,et al. On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[78] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[79] Nallapaneni Manoj Kumar,et al. Blockchain technology for security issues and challenges in IoT , 2018 .
[80] Yuguang Fang,et al. Preserving Model Privacy for Machine Learning in Distributed Systems , 2018, IEEE Transactions on Parallel and Distributed Systems.
[81] Hong Song,et al. Securing Insulin Pump System Using Deep Learning and Gesture Recognition , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[82] Muhammad Ikram,et al. Incognito: A Method for Obfuscating Web Data , 2018, WWW.
[83] Xiaojiang Du,et al. Consortium Blockchain-Based Malware Detection in Mobile Devices , 2018, IEEE Access.
[84] Fabien A. P. Petitcolas,et al. A First Look at Identity Management Schemes on the Blockchain , 2018, IEEE Security & Privacy.
[85] Rajiv Ranjan,et al. IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain , 2018, IEEE Cloud Computing.
[86] Kwangjo Kim,et al. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[87] Gihan J. Mendis,et al. Blockchain as a Service: An Autonomous, Privacy Preserving, Decentralized Architecture for Deep Learning , 2018, ArXiv.
[88] Qiang Fu,et al. Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning , 2018, IEEE Network.
[89] Pascal Bouvry,et al. Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning , 2018, Advances in Intelligent Systems and Computing.
[90] Paul Rad,et al. Blockchain Design for Trusted Decentralized IoT Networks , 2018, 2018 13th Annual Conference on System of Systems Engineering (SoSE).
[91] Kim-Kwang Raymond Choo,et al. A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.
[92] Wei Ni,et al. Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[93] Yu Wang,et al. A Scalable Blockchain Framework for Secure Transactions in IoT , 2019, IEEE Internet of Things Journal.
[94] Witold Pedrycz,et al. Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch , 2019, Inf. Fusion.
[95] Weixian Liao,et al. Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly , 2019, IEEE Access.
[96] Hui Li,et al. Blockchain-Based Secure Time Protection Scheme in IoT , 2019, IEEE Internet of Things Journal.
[97] Khaled Salah,et al. Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.
[98] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[99] Jinjun Chen,et al. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..
[100] Mubashir Husain Rehmani,et al. Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[101] Wei Ni,et al. Survey on blockchain for Internet of Things , 2019, Comput. Commun..
[102] Kevin Kam Fung Yuen,et al. Towards a Cybersecurity Investment Assessment method using Primitive Cognitive Network Process , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
[103] Michele Colajanni,et al. Authorization Transparency for Accountable Access to IoT Services , 2019, 2019 IEEE International Congress on Internet of Things (ICIOT).
[104] Kanchana Thilakarathna,et al. A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists , 2019, AsiaCCS.
[105] Ali Dehghantanha,et al. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.
[106] Mohammad Al-Rubaie,et al. Privacy-Preserving Machine Learning: Threats and Solutions , 2018, IEEE Security & Privacy.
[107] Biplab Sikdar,et al. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.
[108] João Paulo Papa,et al. Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.
[109] Weizhong Yan,et al. On Accurate and Reliable Anomaly Detection for Gas Turbine Combustors: A Deep Learning Approach , 2015, Annual Conference of the PHM Society.
[110] W. Price,et al. Privacy in the age of medical big data , 2019, Nature Medicine.
[111] S. Dunn,et al. Data Privacy Laws Response to Ransomware Attacks: A Multi-Jurisdictional Analysis , 2019, Regulating New Technologies in Uncertain Times.
[112] Shengli Xie,et al. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.
[113] Muhammad Ikram,et al. DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling , 2019, ICETE.
[114] Mayank Vatsa,et al. DeepRing: Protecting Deep Neural Network With Blockchain , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[115] Mohsen Guizani,et al. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.
[116] Mohammed Samaka,et al. Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.
[117] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[118] Richa Singh,et al. Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition , 2019, International Journal of Computer Vision.
[119] K. N. Manjunath,et al. Secured image transmission in medical imaging applications—A survey , 2019 .
[120] Parvez Faruki,et al. Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.
[121] Weixin Xie,et al. Private Machine Learning Classification Based on Fully Homomorphic Encryption , 2020, IEEE Transactions on Emerging Topics in Computing.
[122] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[123] Syed Ali Hassan,et al. Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges , 2019, IEEE Communications Surveys & Tutorials.
[124] Anwar ul Haque,et al. Decentralized Transfer Learning using Blockchain & IPFS for Deep Learning , 2020, 2020 International Conference on Information Networking (ICOIN).
[125] Houbing Song,et al. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.
[126] Vallipuram Muthukkumarasamy,et al. Immutable autobiography of smart cars leveraging blockchain technology , 2020, Knowl. Eng. Rev..
[127] Mohammad Eshghi,et al. Secure decentralized peer-to-peer training of deep neural networks based on distributed ledger technology , 2020, The Journal of Supercomputing.
[128] Syed Ali Hassan,et al. Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.
[129] Luca Oneto,et al. Low-Resource Footprint, Data-Driven Malware Detection on Android , 2020, IEEE Transactions on Sustainable Computing.
[130] Yue Zhang,et al. DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive , 2019, IEEE Transactions on Dependable and Secure Computing.
[131] Jianfeng Ma,et al. PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys , 2018, IEEE Transactions on Services Computing.
[132] Elizabeth S. Bentley,et al. Identification of Wearable Devices with Bluetooth , 2018, IEEE Transactions on Sustainable Computing.
[133] Jin Wei,et al. A Blockchain-Powered Decentralized and Secure Computing Paradigm , 2018, IEEE Transactions on Emerging Topics in Computing.