A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
暂无分享,去创建一个
Xiaojiang Du | Mohsen Guizani | Amr Mohamed | Ihsan Ali | Mohammed Ali Al-Garadi | Abdulla Khalid Al-Ali | M. Guizani | Xiaojiang Du | M. Al-garadi | Amr M. Mohamed | A. Al-Ali | Ihsan Ali
[1] Jin B. Hong,et al. A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..
[2] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[3] Nor Badrul Anuar,et al. Secure and dependable software defined networks , 2016, J. Netw. Comput. Appl..
[4] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[5] Ying Wah Teh,et al. Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges , 2018, Expert Syst. Appl..
[6] Benjamin Schrauwen,et al. Training and Analysing Deep Recurrent Neural Networks , 2013, NIPS.
[7] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[8] Geoffrey E. Hinton. A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.
[9] Hannu Tenhunen,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .
[10] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[11] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[12] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[13] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[14] Luca Maria Gambardella,et al. Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Flexible, High Performance Convolutional Neural Networks for Image Classification , 2022 .
[15] Andrew P. Bradley,et al. The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..
[16] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[17] Yue Wu,et al. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..
[18] Wei Li,et al. Network Intrusion Detection Based on Random Forest and Support Vector Machine , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[19] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[20] Mohammad Zulkernine,et al. A hybrid network intrusion detection technique using random forests , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[21] 김광조,et al. Detecting Active Attacks in WiFi Network by Semi-supervised Deep Learning , 2016 .
[22] Gabriel Dulac-Arnold,et al. Challenges of Real-World Reinforcement Learning , 2019, ArXiv.
[23] Mohsen Guizani,et al. The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.
[24] Ingoo Han,et al. Security threats to Internet: a Korean multi-industry investigation , 2001, Inf. Manag..
[25] Shui Yu,et al. Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks , 2018, IEEE Internet of Things Journal.
[26] Dafang Zhang,et al. A Deep Learning Approach to Android Malware Feature Learning and Detection , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[27] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[28] Aruna Seneviratne,et al. Secure Computation Offloading in Blockchain based IoT Networks with Deep Reinforcement Learning , 2019 .
[29] Xue-wen Chen,et al. Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.
[30] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[31] Di Wu,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[32] Lianbing Deng,et al. Mobile network intrusion detection for IoT system based on transfer learning algorithm , 2018, Cluster Computing.
[33] Lidong Wang,et al. Big Data Analytics for Network Intrusion Detection: A Survey , 2017 .
[34] Clément Farabet,et al. Torch7: A Matlab-like Environment for Machine Learning , 2011, NIPS 2011.
[35] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[36] Ibrar Yaqoob,et al. Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.
[37] Bing Liu,et al. Lifelong Learning for Sentiment Classification , 2015, ACL.
[38] Albert Y. Zomaya,et al. A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[39] Kwangjo Kim,et al. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[40] Antonio Liotta,et al. Ensembles of incremental learners to detect anomalies in ad hoc sensor networks , 2015, Ad Hoc Networks.
[41] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[42] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[43] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[44] Sam Greydanus,et al. Learning the Enigma with Recurrent Neural Networks , 2017, ArXiv.
[45] Li Li,et al. The applications of WiFi-based Wireless Sensor Network in Internet of Things and Smart Grid , 2011, 2011 6th IEEE Conference on Industrial Electronics and Applications.
[46] Radu State,et al. Machine Learning Approach for IP-Flow Record Anomaly Detection , 2011, Networking.
[47] Sudharman K. Jayaweera,et al. A Survey on Machine-Learning Techniques in Cognitive Radios , 2013, IEEE Communications Surveys & Tutorials.
[48] Olivier Markowitch,et al. A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.
[49] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[50] Simon A. Dobson,et al. Adaptive middleware for autonomic systems , 2006, Ann. des Télécommunications.
[51] Mamun Bin Ibne Reaz,et al. A novel SVM-kNN-PSO ensemble method for intrusion detection system , 2016, Appl. Soft Comput..
[52] Yuval Elovici,et al. Detection of Unauthorized IoT Devices Using Machine Learning Techniques , 2017, ArXiv.
[53] Sandip Ray,et al. The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.
[54] Kaoru Ota,et al. Deep Learning for Mobile Multimedia , 2017, ACM Trans. Multim. Comput. Commun. Appl..
[55] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.
[56] Wen-Tsai Sung,et al. Improved Particle Swarm Optimization Algorithm for Android Medical Care IOT using Modified Parameters , 2012, Journal of Medical Systems.
[57] Sudharman K. Jayaweera,et al. Multi-Agent Reinforcement Learning Based Cognitive Anti-Jamming , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[58] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[59] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[60] Dimitris Kanellopoulos,et al. Association Rules Mining: A Recent Overview , 2006 .
[61] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[62] Mubashir Husain Rehmani,et al. Cognitive-Radio-Based Internet of Things: Applications, Architectures, Spectrum Related Functionalities, and Future Research Directions , 2017, IEEE Wireless Communications.
[63] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[64] Aleksandar Vakanski,et al. A secure architecture for IoT with supply chain risk management , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[65] Yong Wang,et al. End-to-End Trust and Security for Internet of Things Applications , 2018, Computer.
[66] Robert Tibshirani,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.
[67] Luigi Atzori,et al. Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies , 2015, IEEE Internet of Things Journal.
[68] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[69] Windu Gata,et al. Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm , 2017, 2017 11th International Conference on Information & Communication Technology and System (ICTS).
[70] Dimitrios Serpanos,et al. The Cyber-Physical Systems Revolution , 2018, Computer.
[71] Daphne Koller,et al. Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..
[72] Mubashir Husain Rehmani,et al. When Cognitive Radio meets the Internet of Things? , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[73] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[74] Soma Bandyopadhyay,et al. Role Of Middleware For Internet Of Things: A Study , 2011 .
[75] Subhash C. Bagui,et al. Combining Pattern Classifiers: Methods and Algorithms , 2005, Technometrics.
[76] Yan Zhen,et al. Application of Internet of Things in Smart Grid Power Transmission , 2012, 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing.
[77] Sepp Hochreiter,et al. Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs) , 2015, ICLR.
[78] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[79] Adam Doupé,et al. Deep Android Malware Detection , 2017, CODASPY.
[80] Sadok Ben Yahia,et al. OMC-IDS: At the Cross-Roads of OLAP Mining and Intrusion Detection , 2012, PAKDD.
[81] Lei Liu,et al. Combining supervised and unsupervised learning for zero-day malware detection , 2013, 2013 Proceedings IEEE INFOCOM.
[82] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[83] Bo Du,et al. Deep Learning for Remote Sensing Data: A Technical Tutorial on the State of the Art , 2016, IEEE Geoscience and Remote Sensing Magazine.
[84] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[85] Mahmood Yousefi-Azar,et al. Autoencoder-based feature learning for cyber security applications , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[86] Hwee Pink Tan,et al. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.
[87] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[88] Dechang Pi,et al. A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection , 2017, KSII Trans. Internet Inf. Syst..
[89] Razvan Pascanu,et al. How to Construct Deep Recurrent Neural Networks , 2013, ICLR.
[90] Nei Kato,et al. State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.
[91] Yi Tay,et al. Deep Learning based Recommender System: A Survey and New Perspectives , 2018 .
[92] Erdogan Dogdu,et al. Context-Aware Computing, Learning, and Big Data in Internet of Things: A Survey , 2018, IEEE Internet of Things Journal.
[93] Omar Y. Al-Jarrah,et al. Semi-supervised multi-layered clustering model for intrusion detection , 2017, Digit. Commun. Networks.
[94] Pablo Torres,et al. An analysis of Recurrent Neural Networks for Botnet detection behavior , 2016, 2016 IEEE Biennial Congress of Argentina (ARGENCON).
[95] Yu Yang,et al. Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.
[96] Jong Hyuk Park,et al. Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..
[97] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[98] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[99] Tao Jiang,et al. A Lightweight Authenticated Communication Scheme for Smart Grid , 2016, IEEE Sensors Journal.
[100] Hamid Sharif,et al. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.
[101] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[102] Myung-Sup Kim,et al. Linear SVM-Based Android Malware Detection for Reliable IoT Services , 2014, J. Appl. Math..
[103] Yuval Elovici,et al. ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis , 2017, SAC.
[104] Michael I. Jordan,et al. On Discriminative vs. Generative Classifiers: A comparison of logistic regression and naive Bayes , 2001, NIPS.
[105] Ming-Yang Su,et al. Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers , 2011, Expert Syst. Appl..
[106] Zheng Zhang,et al. MXNet: A Flexible and Efficient Machine Learning Library for Heterogeneous Distributed Systems , 2015, ArXiv.
[107] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[108] Arun Lakhotia,et al. Are Metamorphic Viruses Really Invincible? , 2022 .
[109] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[110] Jeffrey F. Naughton,et al. A Methodology for Formalizing Model-Inversion Attacks , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[111] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[112] Soma Bandyopadhyay,et al. IoT-Privacy: To be private or not to be private , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[113] George Dimitrakopoulos,et al. Intelligent transportation systems based on internet-connected vehicles: Fundamental research areas and challenges , 2011, 2011 11th International Conference on ITS Telecommunications.
[114] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[115] Richard Demo Souza,et al. A Survey of Machine Learning Techniques Applied to Self-Organizing Cellular Networks , 2017, IEEE Communications Surveys & Tutorials.
[116] G. Priya,et al. EFFICIENT KNN CLASSIFICATION ALGORITHM FOR BIG DATA , 2017 .
[117] Furkan Yusuf Yavuz,et al. Deep learning in cyber security for internet of things , 2018 .
[118] Zhong Chen,et al. Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[119] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[120] Peng Wang,et al. AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction , 2014, ICSE.
[121] Pedro M. Domingos. A few useful things to know about machine learning , 2012, Commun. ACM.
[122] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.
[123] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[124] Laurence T. Yang,et al. Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[125] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[126] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[127] V. Rao Vemuri,et al. Robust Support Vector Machines for Anomaly Detection in Computer Security , 2003, ICMLA.
[128] Yurong Liu,et al. A survey of deep neural network architectures and their applications , 2017, Neurocomputing.
[129] Amutha Prabakar Muniyandi,et al. Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .
[130] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[131] Christin Schäfer,et al. Learning Intrusion Detection: Supervised or Unsupervised? , 2005, ICIAP.
[132] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[133] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[134] Lixiang Li,et al. Nearest neighbors based density peaks approach to intrusion detection , 2018 .
[135] Eric J. Topol,et al. The emerging field of mobile health , 2015, Science Translational Medicine.
[136] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[137] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[138] Manuel Díaz,et al. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing , 2016, J. Netw. Comput. Appl..
[139] Dongsuk Yook,et al. Multitask Learning of Deep Neural Network-Based Keyword Spotting for IoT Devices , 2019, IEEE Transactions on Consumer Electronics.
[140] Abdolreza Mirzaei,et al. Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..
[141] Vijay Janapa Reddi,et al. Deep Reinforcement Learning for Cyber Security , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[142] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[143] G. C. Tiao,et al. Bayesian inference in statistical analysis , 1973 .
[144] Xiaojin Zhu,et al. --1 CONTENTS , 2006 .
[145] Nura Muhammad Baba,et al. CURRENT ISSUES IN ENSEMBLE METHODS AND ITS APPLICATIONS , 2015 .
[146] Ju Ren,et al. Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.
[147] Chakib Bekara,et al. Security Issues and Challenges for the IoT-based Smart Grid , 2014, FNC/MobiSPC.
[148] V. Rao Vemuri,et al. Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..
[149] Tai-Myung Chung,et al. ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approach , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[150] Taghi M. Khoshgoftaar,et al. Deep learning applications and challenges in big data analytics , 2015, Journal of Big Data.
[151] Yacine Challal,et al. A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.
[152] G. D'Agostini,et al. A Multidimensional unfolding method based on Bayes' theorem , 1995 .
[153] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[154] Zilong Ye,et al. Secure the internet of things with challenge response authentication in fog computing , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).
[155] Andreas Pitsillides,et al. Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.
[156] H. Vincent Poor,et al. Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[157] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[158] Ong Bi Lynn,et al. Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).
[159] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[160] Sudip Misra,et al. Cloud Computing Applications for Smart Grid: A Survey , 2015, IEEE Transactions on Parallel and Distributed Systems.
[161] J. Bezdek,et al. FCM: The fuzzy c-means clustering algorithm , 1984 .
[162] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[163] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[164] M. Ufuk Çaglayan,et al. Extracting trust information from security system of a service , 2012, J. Netw. Comput. Appl..
[165] Athanasios V. Vasilakos,et al. The role of big data analytics in Internet of Things , 2017, Comput. Networks.
[166] Ning Wang,et al. Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.
[167] Zheng Yuan,et al. Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[168] Gaetano Marrocco,et al. RFID Technology for IoT-Based Personal Healthcare in Smart Spaces , 2014, IEEE Internet of Things Journal.
[169] Sushma Jain,et al. A survey towards an integration of big data analytics to big insights for value-creation , 2018, Inf. Process. Manag..
[170] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[171] Muhammad Khurram Khan,et al. Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy , 2019, IEEE Transactions on Consumer Electronics.
[172] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[173] Shan Suthaharan,et al. Big data classification: problems and challenges in network intrusion prediction with machine learning , 2014, PERV.
[174] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[175] Soma Bandyopadhyay,et al. Why not keep your personal data secure yet private in IoT?: Our lightweight approach , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[176] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[177] Zoubin Ghahramani,et al. Combining active learning and semi-supervised learning using Gaussian fields and harmonic functions , 2003, ICML 2003.
[178] Wenliang Du,et al. Building decision tree classifier on private data , 2002 .
[179] Qihui Wu,et al. A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.
[180] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[181] Georg Carle,et al. Traffic Anomaly Detection Using K-Means Clustering , 2007 .
[182] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[183] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[184] Nick Feamster,et al. Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[185] Freddy K. Santoso,et al. Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).
[186] Antonio Iera,et al. From "smart objects" to "social objects": The next evolutionary step of the internet of things , 2014, IEEE Communications Magazine.
[187] Ayan Banerjee,et al. Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[188] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[189] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[190] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[191] Walid Saad,et al. Jamming in the Internet of Things: A Game-Theoretic Perspective , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[192] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[193] Dana Kulic,et al. Data augmentation of wearable sensor data for parkinson’s disease monitoring using convolutional neural networks , 2017, ICMI.
[194] D. R. Cutler,et al. Utah State University From the SelectedWorks of , 2017 .
[195] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[196] Richard E. Overill,et al. Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.
[197] Neminath Hubballi,et al. OCPAD: One class Naive Bayes classifier for payload based anomaly detection , 2016, Expert Syst. Appl..
[198] Ayoub Ait Lahcen,et al. Big Data technologies: A survey , 2017, J. King Saud Univ. Comput. Inf. Sci..
[199] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[200] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[201] Nicholas D. Lane,et al. DeepX: A Software Accelerator for Low-Power Deep Learning Inference on Mobile Devices , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[202] Nilanjan Dey,et al. Internet of Things and Big Data Technologies for Next Generation Healthcare , 2017 .
[203] Yong Bai,et al. The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things , 2017, J. Electr. Comput. Eng..
[204] Yan Zhang,et al. Deep Learning for Secure Mobile Edge Computing , 2017, ArXiv.
[205] John Salvatier,et al. Theano: A Python framework for fast computation of mathematical expressions , 2016, ArXiv.
[206] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.
[207] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[208] Ning Zhang,et al. An Open, Secure and Flexible Platform Based on Internet of Things and Cloud Computing for Ambient Aiding Living and Telemedicine , 2011, 2011 International Conference on Computer and Management (CAMAN).
[209] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[210] Weisong Shi,et al. The Promise of Edge Computing , 2016, Computer.
[211] Neelam Sharma,et al. INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .
[212] Xuemin Shen,et al. Channel-Based Sybil Detection in Industrial Wireless Sensor Networks: A Multi-Kernel Approach , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[213] Rashid Mehmood,et al. Data Fusion and IoT for Smart Ubiquitous Environments: A Survey , 2017, IEEE Access.
[214] Hongbo Liu,et al. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT , 2017, MobiHoc.
[215] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[216] Emmanuel Prouff,et al. Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.
[217] David Gil,et al. Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services , 2016, Sensors.
[218] S. O. Falaki,et al. NETWORK INTRUSION DETECTION BASED ON ROUGH SET AND K-NEAREST NEIGHBOUR , 2008 .
[219] Anthony Skjellum,et al. Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[220] Song Guo,et al. The Web of Things: A Survey (Invited Paper) , 2011, J. Commun..
[221] D. Ruppert. The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .
[222] John Tran,et al. cuDNN: Efficient Primitives for Deep Learning , 2014, ArXiv.
[223] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[224] Marius Kloft,et al. Security analysis of online centroid anomaly detection , 2010, J. Mach. Learn. Res..
[225] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[226] Luis Perez,et al. The Effectiveness of Data Augmentation in Image Classification using Deep Learning , 2017, ArXiv.
[227] Sakir Sezer,et al. High accuracy android malware detection using ensemble learning , 2015, IET Inf. Secur..
[228] Sudharman K. Jayaweera,et al. Reinforcement learning based anti-jamming with wideband autonomous cognitive radios , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[229] Sven Behnke,et al. Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition , 2010, ICANN.
[230] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[231] Hamed Haddadi,et al. Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[232] Ravindra C. Thool,et al. Intrusion Detection System Using Bagging Ensemble Method of Machine Learning , 2015, 2015 International Conference on Computing Communication Control and Automation.
[233] Anne M. P. Canuto,et al. A comparative analysis of genetic algorithm and ant colony optimization to select attributes for an heterogeneous ensemble of classifiers , 2010, IEEE Congress on Evolutionary Computation.
[234] Diane J. Cook,et al. CASAS: A Smart Home in a Box , 2013, Computer.
[235] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[236] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[237] Anil K. Jain. Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..
[238] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[239] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[240] Rajkumar Buyya,et al. Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.
[241] Roman Beck,et al. Does Cloud Computing Matter? An Analysis of the Cloud Model Software-as-a-Service and Its Impact on Operational Agility , 2013, 2013 46th Hawaii International Conference on System Sciences.
[242] Yuval Tassa,et al. Continuous control with deep reinforcement learning , 2015, ICLR.
[243] Pushpendra Kumar Pateriya,et al. Development of IoT based smart security and monitoring devices for agriculture , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).
[244] Cha Zhang,et al. Ensemble Machine Learning: Methods and Applications , 2012 .
[245] Md. Zakirul Alam Bhuiyan,et al. A Survey on Deep Learning in Big Data , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[246] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[247] Alexandre X. Falcão,et al. Data clustering as an optimum‐path forest problem with applications in image analysis , 2009, Int. J. Imaging Syst. Technol..
[248] Tom Schaul,et al. Prioritized Experience Replay , 2015, ICLR.
[249] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[250] Kaiyu Wan,et al. Context-Aware Security Solutions for Cyber-Physical Systems , 2012, Mobile Networks and Applications.
[251] Sotiris B. Kotsiantis,et al. Decision trees: a recent overview , 2011, Artificial Intelligence Review.
[252] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[253] Kathleen Goeschel,et al. Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis , 2016, SoutheastCon 2016.
[254] Rituparna Chaki,et al. Secure and trusted cloud of things , 2013, 2013 Annual IEEE India Conference (INDICON).
[255] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[256] R Ravinder Reddy,et al. Enhanced anomaly detection using ensemble support vector machine , 2017, 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC).
[257] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[258] Guy W. Mineau,et al. A simple KNN algorithm for text categorization , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[259] David Silver,et al. Deep Reinforcement Learning with Double Q-Learning , 2015, AAAI.
[260] Piet Demeester,et al. Distributed Neural Networks for Internet of Things: The Big-Little Approach , 2015, IoT 360.
[261] Lemuria Carter,et al. literature review of RFID-enabled healthcare applications and issues amuel , 2013 .
[262] Yan Chen,et al. Intelligent 5G: When Cellular Networks Meet Artificial Intelligence , 2017, IEEE Wireless Communications.
[263] Lan Wang,et al. Securing wireless implantable devices for healthcare: Ideas and challenges , 2009, IEEE Communications Magazine.
[264] Kwangjo Kim,et al. Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning , 2017, WISA.
[265] Qihui Wu,et al. Cognitive Internet of Things: A New Paradigm Beyond Connection , 2014, IEEE Internet of Things Journal.
[266] Djamel Tandjaoui,et al. An end-to-end secure key management protocol for e-health applications , 2015, Comput. Electr. Eng..
[267] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[268] H. T. Kung,et al. Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[269] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[270] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[271] Sijing Zhang,et al. Towards 5G: A Reinforcement Learning-Based Scheduling Solution for Data Traffic Management , 2018, IEEE Transactions on Network and Service Management.
[272] Siobhán Clarke,et al. Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.
[273] Seetha Hari,et al. Learning From Imbalanced Data , 2019, Advances in Computer and Electrical Engineering.
[274] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[275] Razvan Pascanu,et al. On the difficulty of training recurrent neural networks , 2012, ICML.
[276] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[277] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[278] Roksana Boreli,et al. A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[279] Wei Cai,et al. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.
[280] Zixue Cheng,et al. The Web of Things: A Survey (Invited Paper) , 2011, J. Commun..
[281] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[282] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[283] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[284] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[285] Jie Tang,et al. Enabling Deep Learning on IoT Devices , 2017, Computer.
[286] Peng Liu,et al. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved , 2018, IEEE Internet of Things Journal.
[287] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[288] Juan E. Tapiador,et al. Security and privacy issues in implantable medical devices: A comprehensive survey , 2015, J. Biomed. Informatics.
[289] H. Vincent Poor,et al. Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[290] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[291] Amr M. Youssef,et al. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.
[292] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[293] Mianxiong Dong,et al. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.
[294] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[295] Wouter Joosen,et al. Extending sensor networks into the Cloud using Amazon Web Services , 2010, 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications.
[296] Sotiris B. Kotsiantis,et al. Supervised Machine Learning: A Review of Classification Techniques , 2007, Informatica.