Federated learning with non-iid data: A survey

Z Lu, H Pan, Y Dai, X Si, Y Zhang - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Federated learning (FL) is an efficient decentralized machine learning methodology for
processing nonindependent and identically distributed (non-IID) data due to geographical …

Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey

A Vyas, PC Lin, RH Hwang, M Tripathi - IEEE Access, 2024 - ieeexplore.ieee.org
With the rapid development of artificial intelligence and a new generation of network
technologies, the Internet of Things (IoT) is expanding worldwide. Malicious agents …

Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices

UA Isma'ila, KU Danyaro, AA Muazu… - IEEE Access, 2024 - ieeexplore.ieee.org
The novelty of Federated Learning (FL) has emerged as a promising alternative to
centralized machine learning systems in the context of anomaly-based intrusion detection …

A comprehensive intrusion detection method for the internet of vehicles based on federated learning architecture

K Huang, R Xian, M Xian, H Wang, L Ni - Computers & Security, 2024 - Elsevier
Cybersecurity breaches within the Internet of Vehicles (IoV) have been increasingly reported
annually with the proliferation of intelligent connected vehicles. Two primary obstacles are …

SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things

Y Shen, C Shepherd, M Ahmed… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Malware propagation in IoT (Internet of Things) systems can lead to data leakages, financial
losses, and other serious consequences. To solve this issue, we propose a new active IoT …

Spatial Data Transformation and Vision Learning For Elevating Intrusion Detection in IoT Networks

VL Nguyen, HP Tsai, H Shin… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Network intrusion detection systems (NIDS) are vital for identifying security attacks and
predicting early invasion attempts, which is essential for protecting the Internet. Recently …

GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways

J Cao, Y Xu, E Yu, Q Xiang, K Song, L He, G Cheng - Computer Networks, 2024 - Elsevier
Abstract The Internet of Things (IoT) landscape is booming, and a wide range of IoT
endpoints has been integrated into various aspects of life, opening opportunities for …

Detecting Internet-of-Things Malware on Evidence Generation

YS Han, HB Seo, MK Yoon - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Malware has been a real threat to Internet-of-Things (IoT). Although commercial antivirus
solutions can detect malware files and provide label information indicating malware types or …

FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier

C Jiang, C Xia, M Liu, R Fang, P Li… - … Joint Conference on …, 2024 - ieeexplore.ieee.org
The federated Android malware classifier has attracted much attention owing to its
advantages of privacy protection and multi-party joint modeling. However, the research …

MalBuster: Scalable, Real-Time, and Concept Drift-Adaptive Malware Detection for Smart Environments

J Wang, P Li, E Weitkamp, Y Satani… - 2024 IEEE 21st …, 2024 - ieeexplore.ieee.org
Securing connected devices in smart environments is crucial in the age of Internet of Things
(IoT). This paper proposes “MalBuster”, a scalable and real-time malware detection system …