A systematic review on Deep Learning approaches for IoT security
暂无分享,去创建一个
Lerina Aversano | Mario Luca Bernardi | Marta Cimitile | Riccardo Pecori | L. Aversano | M. Bernardi | Marta Cimitile | R. Pecori | Lerina Aversano
[1] Amir H. Gandomi,et al. Cost-sensitive stacked auto-encoders for intrusion detection in the Internet of Things , 2021, Internet Things.
[2] Nagaraj Balakrishnan,et al. Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things , 2019, Internet Things.
[3] Mohamed Amine Ferrag,et al. DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.
[4] Ali Kashif Bashir,et al. Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN , 2020, Future Gener. Comput. Syst..
[5] Dengpan Ye,et al. SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application , 2020, J. Netw. Comput. Appl..
[6] Kim-Kwang Raymond Choo,et al. Detecting Internet of Things attacks using distributed deep learning , 2020, J. Netw. Comput. Appl..
[7] Luca Veltri,et al. IoT Attack Detection with Deep Learning Analysis , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).
[8] Mohan Li,et al. Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.
[9] Zhiyang Li,et al. Deep-Reinforcement-Learning-Based QoS-Aware Secure Routing for SDN-IoT , 2020, IEEE Internet of Things Journal.
[10] Jingwei Li,et al. A Network Attack Detection Method Using SDA and Deep Neural Network Based on Internet of Things , 2020, Int. J. Wirel. Inf. Networks.
[11] Yu Wang,et al. DeePGA: A Privacy-Preserving Data Aggregation Game in Crowdsensing via Deep Reinforcement Learning , 2020, IEEE Internet of Things Journal.
[12] Hongli Zhang,et al. Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning , 2020, IEEE Access.
[13] Bingcai Chen,et al. End-to-end malware detection for android IoT devices using deep learning , 2020, Ad Hoc Networks.
[14] S. Manimurugan,et al. Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network , 2020, IEEE Access.
[15] Nasir Ghani,et al. On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild , 2020, Comput. Secur..
[16] Zahra Pooranian,et al. Adversarial android malware detection for mobile multimedia applications in IoT environments , 2020, Multimedia Tools and Applications.
[17] Fadi Al-Turjman,et al. Applications of Artificial Intelligence and Machine learning in smart cities , 2020, Comput. Commun..
[18] Nor Badrul Anuar,et al. The rise of traffic classification in IoT networks: A survey , 2020, J. Netw. Comput. Appl..
[19] Yang Xin,et al. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .
[20] Wooyeon Jo,et al. APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE , 2020, Appl. Soft Comput..
[21] Ahmad S. Almogren,et al. Intrusion detection in Edge-of-Things computing , 2020, J. Parallel Distributed Comput..
[22] Chao Chen,et al. Cyber Vulnerability Intelligence for Internet of Things Binary , 2020, IEEE Transactions on Industrial Informatics.
[23] Stratis Ioannidis,et al. No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments , 2020, IEEE Transactions on Cognitive Communications and Networking.
[24] Xiaojiang Du,et al. A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.
[25] Adam Hahn,et al. Cyber Physical Security Analytics for Transactive Energy Systems , 2020, IEEE Transactions on Smart Grid.
[26] Gang Zhou,et al. IoT botnet detection via power consumption modeling , 2020 .
[27] Xiaofei Xing,et al. Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT , 2020, IEEE Transactions on Industrial Informatics.
[28] Ke Zhang,et al. Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment , 2020, IEEE Internet of Things Journal.
[29] Po-Ching Lin,et al. An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection , 2020, IEEE Access.
[30] Muhammad Imran,et al. Deep learning and big data technologies for IoT security , 2020, Comput. Commun..
[31] Mohamed Amine Ferrag,et al. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..
[32] Xiaojiang Du,et al. A deep learning based static taint analysis approach for IoT software vulnerability location , 2020 .
[33] Refik Samet,et al. A Comprehensive Review on Malware Detection Approaches , 2020, IEEE Access.
[34] Riccardo Bonetto,et al. Smart Grids for Smarter Cities , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).
[35] Ming Liu,et al. Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure , 2020, IEEE Transactions on Vehicular Technology.
[36] Ruchi Vishwakarma,et al. A survey of DDoS attacking techniques and defence mechanisms in the IoT network , 2019, Telecommunication Systems.
[37] Mauro Conti,et al. On defending against label flipping attacks on malware detection systems , 2019, Neural Computing and Applications.
[38] Syed Ali Hassan,et al. Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.
[39] Xiaojiang Du,et al. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.
[40] Alessandro Armando,et al. Automated Security Analysis of IoT Software Updates , 2019, WISTP.
[41] Hao Wu,et al. BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary , 2019, IEEE Access.
[42] V. M. Krundyshev. Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks , 2019, Automatic Control and Computer Sciences.
[43] U. OmKumarC.,et al. Detecting and confronting flash attacks from IoT botnets , 2019, J. Supercomput..
[44] Lianbing Deng,et al. IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning , 2019, Int. J. Inf. Manag..
[45] Mathias Payer,et al. FirmFuzz: Automated IoT Firmware Introspection and Analysis , 2019, IoT S&P@CCS.
[46] Weixian Liao,et al. Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly , 2019, IEEE Access.
[47] A. A. Zaidan,et al. Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions , 2019, Neural Computing and Applications.
[48] Haipeng Yao,et al. Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection , 2019, IEEE Network.
[49] Hamad Naeem,et al. Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence , 2019, Wirel. Pers. Commun..
[50] Riccardo Pecori,et al. Augmenting Quality of Experience in Distance Learning Using Fog Computing , 2019, IEEE Internet Computing.
[51] Gloria Hyunjung Kwak,et al. DeepHealth: Deep Learning for Health Informatics , 2019, ArXiv.
[52] Xifeng Wang,et al. Wireless Network Attack Defense Algorithm Using Deep Neural Network in Internet of Things Environment , 2019, Int. J. Wirel. Inf. Networks.
[53] Muhammad Ahsan Latif,et al. Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.
[54] H. Vincent Poor,et al. PC2A: Predicting Collective Contextual Anomalies via LSTM With Deep Generative Model , 2019, IEEE Internet of Things Journal.
[55] Pietro Ducange,et al. Incremental Learning of Fuzzy Decision Trees for Streaming Data Classification , 2019, EUSFLAT Conf..
[56] Jong Hyuk Park,et al. Distributed denial of service attacks and its defenses in IoT: a survey , 2019, The Journal of Supercomputing.
[57] Qingqi Pei,et al. Privacy-Preserving Compressive Model for Enhanced Deep-Learning-Based Service Provision System in Edge Computing , 2019, IEEE Access.
[58] Qi Cui,et al. A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things , 2019, IEEE Access.
[59] Foutse Khomh,et al. Enforcing security in Internet of Things frameworks: A Systematic Literature Review , 2019, Internet Things.
[60] Richeng Jin,et al. Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT , 2019, IEEE Internet of Things Journal.
[61] Wen-Zhan Song,et al. Enhanced Cyber-Physical Security in Internet of Things Through Energy Auditing , 2019, IEEE Internet of Things Journal.
[62] Zhuobiao Qiao,et al. Robust Pervasive Detection for Adversarial Samples of Artificial Intelligence in IoT Environments , 2019, IEEE Access.
[63] Nour Moustafa,et al. Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions , 2019, IEEE Access.
[64] Zhenkai Liang,et al. I Can See Your Brain: Investigating Home-Use Electroencephalography System Security , 2019, IEEE Internet of Things Journal.
[65] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[66] Ying Zhang,et al. Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.
[67] Zhu Han,et al. Capsule Network Assisted IoT Traffic Classification Mechanism for Smart Cities , 2019, IEEE Internet of Things Journal.
[68] Xiang-Yang Li,et al. System Statistics Learning-Based IoT Security: Feasibility and Suitability , 2019, IEEE Internet of Things Journal.
[69] Arvid Lundervold,et al. An overview of deep learning in medical imaging focusing on MRI , 2018, Zeitschrift fur medizinische Physik.
[70] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[71] Debayan Das,et al. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.
[72] Walid Saad,et al. Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems , 2018, IEEE Transactions on Communications.
[73] Hong Wen,et al. Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication , 2019, IEEE Access.
[74] Haibo Liu,et al. A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning , 2019, IEEE Access.
[75] Ali Dehghantanha,et al. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.
[76] Luca Veltri,et al. MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities , 2018 .
[77] Ahmed Dawoud,et al. Deep learning and software-defined networks: Towards secure IoT architecture , 2018, Internet Things.
[78] Dongming Wang,et al. Secure mobile crowdsensing based on deep learning , 2018, China Communications.
[79] John Yearwood,et al. A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network , 2018, J. Parallel Distributed Comput..
[80] Luca Veltri,et al. A Token-based Protocol for Securing MQTT Communications , 2018, 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
[81] Naveen K. Chilamkurti,et al. Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications , 2018, IEEE Communications Magazine.
[82] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[83] Michal Choras,et al. A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..
[84] Ying Wah Teh,et al. Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges , 2018, Expert Syst. Appl..
[85] Sukumar Mishra,et al. Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks , 2018, Journal of Medical Systems.
[86] Nour Moustafa,et al. Identification of malicious activities in industrial internet of things based on deep learning models , 2018, J. Inf. Secur. Appl..
[87] Ali Dehghantanha,et al. A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..
[88] Victor I. Chang,et al. A Proposed Solution and Future Direction for Blockchain-Based Heterogeneous Medicare Data in Cloud Environment , 2018, Journal of Medical Systems.
[89] Laurence T. Yang,et al. A survey on deep learning for big data , 2018, Inf. Fusion.
[90] Jong Hyuk Park,et al. OpCloudSec: Open cloud software defined wireless network security for the Internet of Things , 2018, Comput. Commun..
[91] Archan Misra,et al. Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks , 2018, Computer.
[92] Hamed Haddadi,et al. Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning , 2018, Computer.
[93] Wei Yu,et al. A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.
[94] Abdelouahid Derhab,et al. MalDozer: Automatic framework for android malware detection using deep learning , 2018, Digit. Investig..
[95] Kwangjo Kim,et al. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[96] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[97] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[98] Bishal Thapa,et al. Machine Learning Approach to RF Transmitter Identification , 2017, IEEE Journal of Radio Frequency Identification.
[99] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[100] Pietro Ducange,et al. A glimpse on big data analytics in the framework of marketing strategies , 2017, Soft Computing.
[101] Seon Ho Oh,et al. Compact deep learned feature-based face recognition for Visual Internet of Things , 2017, The Journal of Supercomputing.
[102] Athanasios V. Vasilakos,et al. The role of big data analytics in Internet of Things , 2017, Comput. Networks.
[103] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[104] Massimo Vecchio,et al. The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices , 2017, IoTBDS.
[105] Margaret Lech,et al. Evaluating deep learning architectures for Speech Emotion Recognition , 2017, Neural Networks.
[106] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[107] Alagan Anpalagan,et al. Resource allocation and congestion control in clustered M2M communication using Q‐learning , 2017, Trans. Emerg. Telecommun. Technol..
[108] H. Vincent Poor,et al. Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[109] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[110] Daniel Jeswin Nallathambi,et al. Use of honeypots for mitigating DoS attacks targeted on IoT networks , 2017, 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP).
[111] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[112] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[113] Siobhán Clarke,et al. Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.
[114] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.
[115] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[116] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[117] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[118] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[119] Alessio Merlo,et al. Measuring and estimating power consumption in Android to support energy-based intrusion detection , 2015, J. Comput. Secur..
[120] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[121] Dong Yu,et al. Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..
[122] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[123] Xue-wen Chen,et al. Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.
[124] Alessio Merlo,et al. Improving energy efficiency in distributed intrusion detection systems , 2013, J. High Speed Networks.
[125] David D. Cox,et al. Making a Science of Model Search: Hyperparameter Optimization in Hundreds of Dimensions for Vision Architectures , 2013, ICML.
[126] Razvan Pascanu,et al. On the difficulty of training recurrent neural networks , 2012, ICML.
[127] Riccardo Pecori,et al. A PKI-free key agreement protocol for P2P VoIP applications , 2012, 2012 IEEE International Conference on Communications (ICC).
[128] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[129] Geoffrey E. Hinton. A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.
[130] Yu Yang,et al. Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.
[131] Luca Veltri,et al. A key agreement protocol for P2P VoIP applications , 2009, SoftCOM 2009 - 17th International Conference on Software, Telecommunications & Computer Networks.
[132] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[133] Subhash C. Bagui,et al. Combining Pattern Classifiers: Methods and Algorithms , 2005, Technometrics.
[134] Barbara Kitchenham,et al. Procedures for Performing Systematic Reviews , 2004 .
[135] Robert Tibshirani,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.
[136] M. W Gardner,et al. Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences , 1998 .