Practical membership inference attack against collaborative inference in industrial IoT

H Chen, H Li, G Dong, M Hao, G Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The effectiveness of state-of-the-art deep learning (DL) models has empowered the
development of industrial Internet of things (IIoT). Recently, considering resource …

Enhancing cyber security in IoT systems using FL-based IDS with differential privacy

Z Anastasakis, K Psychogyios… - 2022 Global …, 2022 - ieeexplore.ieee.org
Nowadays, IoT networks and devices exist in our everyday life, capturing and carrying
unlimited data. However, increasing penetration of connected systems and devices implies …

ITCN: An intelligent trust collaboration network system in IoT

J Guo, A Liu, K Ota, M Dong, X Deng… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Artificial Intelligence (AI) technology has been widely applied to Internet of Thing (IoT) and
one of key application is intelligence data collection from billions of IoT devices. However …

Trusted Federated Learning Framework for Attack Detection in Edge Industrial Internet of Things

MP Singh, A Anand, LAP Janaswamy… - … Conference on Fog …, 2023 - ieeexplore.ieee.org
The edge Industrial Internet of Things (IIoT) is highly vulnerable to attacks due to the vast
number of connected devices and the lack of security features. Attacks in edge IIoT can lead …

Detecting network attacks using federated learning for iot devices

O Shahid, V Mothukuri, S Pouriyeh… - 2021 IEEE 29th …, 2021 - ieeexplore.ieee.org
Billions of IoT devices are connected to networks all around us, enabling cyber-physical
systems. These devices can carry and generate user-sensitive data, examples of such …

Secure edge computing in IoT systems: Review and case studies

M Alrowaily, Z Lu - 2018 IEEE/ACM symposium on edge …, 2018 - ieeexplore.ieee.org
Today, the architectures for efficient and secure network system designs, such as Internet of
Things (IoT) and big data analytics, are growing at a faster pace than ever before. Edge …

PipeEdge: A trusted pipelining collaborative edge training based on blockchain

L Yuan, Q He, F Chen, R Dou, H Jin… - Proceedings of the ACM …, 2023 - dl.acm.org
Powered by the massive data generated by the blossom of mobile and Web-of-Things (WoT)
devices, Deep Neural Networks (DNNs) have developed both in accuracy and size in recent …

Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection

H Wang, L Muñoz-González, D Eklund… - Proceedings of the 14th …, 2021 - dl.acm.org
The increase of the computational power in edge devices has enabled the penetration of
distributed machine learning technologies such as federated learning, which allows to build …

PrivStream: A privacy-preserving inference framework on IoT streaming data at the edge

D Wang, J Ren, Z Wang, Y Zhang, XS Shen - Information Fusion, 2022 - Elsevier
Edge computing combining with artificial intelligence (AI) has enabled the timely processing
and analysis of streaming data produced by IoT intelligent applications. However, it causes …

Confidential execution of deep learning inference at the untrusted edge with arm trustzone

MS Islam, M Zamani, CH Kim, L Khan… - Proceedings of the …, 2023 - dl.acm.org
This paper proposes a new confidential deep learning (DL) inference system with ARM
TrustZone to provide confidentiality and integrity of DL models and data in an untrusted …