[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… The authors of this paper reviewed the security and threat in … In paper [65,66|| authors address
the intrusion detection in IoT … network uses different consensus algorithm |89|| to meet the …

[PDF][PDF] 阁EasyChair Preprint

M Sandhya, K Vignesh - 2024 - easychair.org
… In the quest to meet these pressing challenges, modern agriculture has found an indispensable
ally in the form of technology, specifically, the Internet of Things (IoT), predictive analytics…

基于区块链的非结构化大数据动态安全存储

段平 - 吉林大学学报(信息科学版), 2020 - xuebao.jlu.edu.cn
… We propose a dynamic secure storage technology of unstructured big data based on block
chain… The public and private keys of block chain asymmetric encryption technology is used to …

结合特征选择的SAE-LSTM 入侵检测模型.

王文涛, 汤婕, 王嘉鑫 - Journal of South-Central Minzu …, 2022 - search.ebscohost.com
… To address these two problems,this paper proposes an SAE-LSTM intrusion detection
framework that combines feature selection with a random forest feature scoring mechanism that …

[PDF][PDF] 李平, 林亚平, 曾玮妮

P LI, YP LIN, WN ZENG - Journal of Software, 2006 - jos.org.cn
… Much of the review presented in this paper was the outcome of the first author’s academic …
Self-Organized criticality and stochastic learning-based intrusion detection system for wireless …

基于区块链的联邦学习: 模型, 方法与应用

李程, 袁勇, 郑志勇, 杨东, 王飞跃 - 自动化学报, 2024 - aas.net.cn
… -enabled federated learning based on a comprehensive review of related literatures, and …
When collaborative federated learning meets blockchain to preserve privacy in healthcare[J]…

[HTML][HTML] 基于云或区块链的物联网: 比较调查和前进道路

李建平 - 信息与电子工程前沿(英文), 2022 - fitee.zjujournals.com
blockchain as an infrastructure. The two architectures are compared based on their strengths
and weaknesses. Then a brief survey of ongoing key research activities in blockchain is …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

E AYDIN - 2022 - polen.itu.edu.tr
This thesis in general focuses on the scalability, resource, and latency issues of authentication
schemes actively used in wireless sensor and 3rd generation partnership project (3GPP) …

[PDF][PDF] 互联网内生安全体系结构研究进展

徐恪, 付松涛, 李琦, 刘冰洋, 江伟玉, 吴波, 冯学伟 - 计算机学报, 2021 - 159.226.43.17
… the users and network, is not enough to meet the security requirements of the network. To …
首 先是方案解决安全问题的能力,如在针对入侵检测 系统(Intrusion Detection System,IDS)性能…

[PDF][PDF] 基于区块链的隐私保护可信联邦学习模型

朱建明, 张沁楠, 高胜, 丁庆洋, 袁丽萍 - 计算机学报, 2021 - 159.226.43.17
… of the model training process recorded on the blockchain as evidence. Moreover, the
cooperative … The experiment of blockchain performance confirmed that our scheme has good …