Secure deep learning in defense in deep-learning-as-a-service computing systems in digital twins

Z Lv, D Chen, B Cao, H Song… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
While Digital Twins (DTs) bring convenience to city managers, they also generate new
challenges to city network security. Currently, cyberspace security becomes increasingly …

Blockchain based decentralized learning for security in digital twins

Z Lv, C Cheng, H Lv - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
This work aims to analyze malicious communication behaviors that pose a threat to the
security of digital twins (DTs) and safeguard user privacy. A unified and integrated …

[HTML][HTML] MUD enabled deep learning framework for anomaly detection in IoT integrated smart building

S Mirdula, M Roopa - e-Prime-Advances in Electrical Engineering …, 2023 - Elsevier
Abstract Nowadays, many Internet of Things (IoT) devices of different types are used in
creating smart applications like smart cities, smart industries, smart environments, and the …

A review of deep learning security and privacy defensive techniques

MI Tariq, NA Memon, S Ahmed… - Mobile Information …, 2020 - Wiley Online Library
In recent past years, Deep Learning presented an excellent performance in different areas
like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has …

Digital twin virtualization with machine learning for IoT and beyond 5G networks: Research directions for security and optimal control

J Jagannath, K Ramezanpour… - Proceedings of the 2022 …, 2022 - dl.acm.org
Digital twin (DT) technologies have emerged as a solution for real-time data-driven
modeling of cyber physical systems (CPS) using the vast amount of data available by …

Deep learning in security of internet of things

Y Li, Y Zuo, H Song, Z Lv - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology is increasingly prominent in the current stage of social
development. All walks of life have begun to implement the IoT integration technology, so as …

How to steal a machine learning classifier with deep learning

Y Shi, Y Sagduyu, A Grushin - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
This paper presents an exploratory machine learning attack based on deep learning to infer
the functionality of an arbitrary classifier by polling it as a black box, and using returned …

Collaborative cyber attack defense in SDN networks using blockchain technology

M Hajizadeh, N Afraz, M Ruffini… - 2020 6th IEEE …, 2020 - ieeexplore.ieee.org
The legacy security defense mechanisms cannot resist where emerging sophisticated
threats such as zero-day and malware campaigns have profoundly changed the dimensions …

Smart grid: Cyber attacks, critical defense approaches, and digital twin

T Zheng, M Liu, D Puthal, P Yi, Y Wu, X He - arXiv preprint arXiv …, 2022 - arxiv.org
As a national critical infrastructure, the smart grid has attracted widespread attention for its
cybersecurity issues. The development towards an intelligent, digital, and Internetconnected …

Data security issues in deep learning: Attacks, countermeasures, and opportunities

G Xu, H Li, H Ren, K Yang… - IEEE Communications …, 2019 - ieeexplore.ieee.org
Benefiting from the advancement of algorithms in massive data and powerful computing
resources, deep learning has been explored in a wide variety of fields and produced …