Survey of graph neural networks and applications

F Liang, C Qian, W Yu, D Griffith… - … and Mobile Computing, 2022 - Wiley Online Library
The advance of deep learning has shown great potential in applications (speech, image,
and video classification). In these applications, deep learning models are trained by …

A novel deep learning-based intrusion detection system for IOT networks

A Awajan - Computers, 2023 - mdpi.com
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of
cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and …

A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice

J Yang, L Sun - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid development and wide application of the Internet of Things (IoT) and sensor
technologies have produced good opportunities for the development of IoT-based smart …

Intrusion detection in iot using deep learning

AM Banaamah, I Ahmad - Sensors, 2022 - mdpi.com
Cybersecurity has been widely used in various applications, such as intelligent industrial
systems, homes, personal devices, and cars, and has led to innovative developments that …

Healthcare data quality assessment for cybersecurity intelligence

Y Li, J Yang, Z Zhang, J Wen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Considering the efficiency and security of healthcare data processing, indiscriminate data
collection, annotation, and transmission are unwise. In this article, we propose the …

Hardware Design and Implementation of Multiagent MLP Regression for the Estimation of Gunshot Direction on IoBT Edge Gateway

NB Gaikwad, SK Khare, H Ugale… - IEEE Sensors …, 2023 - ieeexplore.ieee.org
The advancements in the Internet of Things (IoT), artificial intelligence, and state-of-the-art
computing techniques are the main pillars of the next-generation defense technology. The …

Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology.

H Miriam, D Doreen, D Dahiya… - … Automation & Soft …, 2023 - search.ebscohost.com
Blockchain technology is critical in cyber security. The most recent cryptographic strategies
may be hacked as efforts are made to build massive electronic circuits. Because of the …

Enzyme commission number prediction and benchmarking with hierarchical dual-core multitask learning framework

Z Shi, R Deng, Q Yuan, Z Mao, R Wang, H Li, X Liao… - Research, 2023 - spj.science.org
Enzyme commission (EC) numbers, which associate a protein sequence with the
biochemical reactions it catalyzes, are essential for the accurate understanding of enzyme …

[HTML][HTML] Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification

PMS Sánchez, AH Celdrán, G Bovet… - Future Generation …, 2024 - Elsevier
In the last years, the number of IoT devices deployed has suffered an undoubted explosion,
reaching the scale of billions. However, some new cybersecurity issues have appeared …

TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things

X Feng, H Xia, S Xu, L Xu, R Zhang - Expert Systems with Applications, 2023 - Elsevier
The lack of effective defense resource allocation strategies and reliable multi-agent
collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …