Adversarial Artificial Intelligence Assistance for Secure 5G-Enabled IoT
暂无分享,去创建一个
Amit Ganatra | Mohammed Husain Bohara | Khushi Patel | Atufaali saiyed | A. Ganatra | M. Bohara | Khushi Patel | Atufaali saiyed
[1] Joel J. P. C. Rodrigues,et al. Tactile Internet for Smart Communities in 5G: An Insight for NOMA-Based Solutions , 2019, IEEE Transactions on Industrial Informatics.
[2] Saman K. Halgamuge,et al. Classification and clustering for knowledge discovery , 2005 .
[3] Lei Shu,et al. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges , 2020, IEEE Access.
[4] Abdeljalil Gattal,et al. Automatic Parameter Tuning of K-Means Algorithm for Document Binarization , 2018, ICSE 2018.
[5] John MacIntyre,et al. Data Mining and User Profiling for An E-Commerce System. , 2002 .
[6] Terrance E. Boult,et al. Assessing Threat of Adversarial Examples on Deep Neural Networks , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[7] Mayank Vatsa,et al. Securing CNN Model and Biometric Template using Blockchain , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[8] Jong-ho Noh,et al. A Study on smart city security policy based on blockchain in 5G Age , 2019, 2019 International Conference on Platform Technology and Service (PlatCon).
[9] Sudeep Tanwar,et al. M-Tesla-Based Security Assessment in Wireless Sensor Network , 2018 .
[10] Ashok Kumar Das,et al. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment , 2020, IEEE Transactions on Industrial Informatics.
[11] Sudeep Tanwar,et al. Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges , 2020, Mechanical Systems and Signal Processing.
[12] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[13] C. Lee Giles,et al. Overfitting and neural networks: conjugate gradient and backpropagation , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[14] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[15] Jaime Lloret,et al. A cognitive network management system to improve QoE in stereoscopic IPTV service , 2019, Int. J. Commun. Syst..
[16] Ashish Khanna,et al. Boosted neural network ensemble classification for lung cancer disease diagnosis , 2019, Appl. Soft Comput..
[17] Sudeep Tanwar,et al. Fog-based enhanced safety management system for miners , 2017, 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall).
[18] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[19] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[20] Mamta Agiwal,et al. Towards Connected Living: 5G Enabled Internet of Things (IoT) , 2019 .
[21] Neeraj Kumar,et al. Tactile internet and its applications in 5G era: A comprehensive review , 2019, Int. J. Commun. Syst..
[22] Gang Hua,et al. Multimedia Big Data Computing , 2015, IEEE Multim..
[23] Q. Zou,et al. Representation of fluctuation features in pathological knee joint vibroarthrographic signals using kernel density modeling method. , 2014, Medical engineering & physics.
[24] Mayank Vatsa,et al. DeepRing: Protecting Deep Neural Network With Blockchain , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[25] Nello Cristianini,et al. An introduction to Support Vector Machines , 2000 .
[26] Neeraj Kumar,et al. Machine Learning Models for Secure Data Analytics: A taxonomy and threat model , 2020, Comput. Commun..
[27] Neeraj Kumar,et al. A taxonomy of AI techniques for 6G communication networks , 2020, Comput. Commun..
[28] G. M. Siddesh,et al. A Study of Use Cases for Smart Contracts Using Blockchain Technology , 2019, Int. J. Inf. Syst. Soc. Chang..
[29] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[30] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[31] R. Ravinder Reddy,et al. A Review on Machine Learning Trends, Application and Challenges in Internet of Things , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[32] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[33] Daniel Minoli,et al. Positioning of blockchain mechanisms in IOT-powered smart home systems: A gateway-based approach , 2020, Internet Things.
[34] Richard S. Sutton,et al. Introduction to Reinforcement Learning , 1998 .
[35] Khaled Salah,et al. Blockchain for explainable and trustworthy artificial intelligence , 2019, WIREs Data Mining Knowl. Discov..
[36] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[37] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Bhabendu Kumar Mohanta,et al. An Overview of Smart Contract and Use Cases in Blockchain Technology , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).