Adversarial Artificial Intelligence Assistance for Secure 5G-Enabled IoT

[1]  Joel J. P. C. Rodrigues,et al.  Tactile Internet for Smart Communities in 5G: An Insight for NOMA-Based Solutions , 2019, IEEE Transactions on Industrial Informatics.

[2]  Saman K. Halgamuge,et al.  Classification and clustering for knowledge discovery , 2005 .

[3]  Lei Shu,et al.  Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges , 2020, IEEE Access.

[4]  Abdeljalil Gattal,et al.  Automatic Parameter Tuning of K-Means Algorithm for Document Binarization , 2018, ICSE 2018.

[5]  John MacIntyre,et al.  Data Mining and User Profiling for An E-Commerce System. , 2002 .

[6]  Terrance E. Boult,et al.  Assessing Threat of Adversarial Examples on Deep Neural Networks , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[7]  Mayank Vatsa,et al.  Securing CNN Model and Biometric Template using Blockchain , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[8]  Jong-ho Noh,et al.  A Study on smart city security policy based on blockchain in 5G Age , 2019, 2019 International Conference on Platform Technology and Service (PlatCon).

[9]  Sudeep Tanwar,et al.  M-Tesla-Based Security Assessment in Wireless Sensor Network , 2018 .

[10]  Ashok Kumar Das,et al.  Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment , 2020, IEEE Transactions on Industrial Informatics.

[11]  Sudeep Tanwar,et al.  Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges , 2020, Mechanical Systems and Signal Processing.

[12]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[13]  C. Lee Giles,et al.  Overfitting and neural networks: conjugate gradient and backpropagation , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[14]  Kouichi Sakurai,et al.  One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.

[15]  Jaime Lloret,et al.  A cognitive network management system to improve QoE in stereoscopic IPTV service , 2019, Int. J. Commun. Syst..

[16]  Ashish Khanna,et al.  Boosted neural network ensemble classification for lung cancer disease diagnosis , 2019, Appl. Soft Comput..

[17]  Sudeep Tanwar,et al.  Fog-based enhanced safety management system for miners , 2017, 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall).

[18]  Atul Prakash,et al.  Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[19]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[20]  Mamta Agiwal,et al.  Towards Connected Living: 5G Enabled Internet of Things (IoT) , 2019 .

[21]  Neeraj Kumar,et al.  Tactile internet and its applications in 5G era: A comprehensive review , 2019, Int. J. Commun. Syst..

[22]  Gang Hua,et al.  Multimedia Big Data Computing , 2015, IEEE Multim..

[23]  Q. Zou,et al.  Representation of fluctuation features in pathological knee joint vibroarthrographic signals using kernel density modeling method. , 2014, Medical engineering & physics.

[24]  Mayank Vatsa,et al.  DeepRing: Protecting Deep Neural Network With Blockchain , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[25]  Nello Cristianini,et al.  An introduction to Support Vector Machines , 2000 .

[26]  Neeraj Kumar,et al.  Machine Learning Models for Secure Data Analytics: A taxonomy and threat model , 2020, Comput. Commun..

[27]  Neeraj Kumar,et al.  A taxonomy of AI techniques for 6G communication networks , 2020, Comput. Commun..

[28]  G. M. Siddesh,et al.  A Study of Use Cases for Smart Contracts Using Blockchain Technology , 2019, Int. J. Inf. Syst. Soc. Chang..

[29]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[30]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[31]  R. Ravinder Reddy,et al.  A Review on Machine Learning Trends, Application and Challenges in Internet of Things , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[32]  David A. Wagner,et al.  Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[33]  Daniel Minoli,et al.  Positioning of blockchain mechanisms in IOT-powered smart home systems: A gateway-based approach , 2020, Internet Things.

[34]  Richard S. Sutton,et al.  Introduction to Reinforcement Learning , 1998 .

[35]  Khaled Salah,et al.  Blockchain for explainable and trustworthy artificial intelligence , 2019, WIREs Data Mining Knowl. Discov..

[36]  Ananthram Swami,et al.  Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).

[37]  Seyed-Mohsen Moosavi-Dezfooli,et al.  DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[38]  Bhabendu Kumar Mohanta,et al.  An Overview of Smart Contract and Use Cases in Blockchain Technology , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).