Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

A tutorial on AI-powered 3D deployment of drone base stations: State of the art, applications and challenges

N Parvaresh, M Kulhandjian, H Kulhandjian… - Vehicular …, 2022 - Elsevier
Deploying uncrewed aerial vehicles (UAVs) as aerial base stations (BSs) to assist terrestrial
connectivity has drawn significant attention in recent years. Alongside other UAV types …

Secure industrial iot systems via rf fingerprinting under impaired channels with interference and noise

OM Gul, M Kulhandjian, B Kantarci, A Touazi… - IEEE …, 2023 - ieeexplore.ieee.org
Industrial IoT-enabled critical infrastructures are susceptible to cyber attacks due to their
mission-critical deployment. To ensure security by design, radio frequency (RF)-based …

Traffic-aware reliable scheduling in TSCH networks for industry 4.0: A systematic mapping review

A Tabouche, B Djamaa… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Recently, mission-critical Industrial Internet of Things (IIoT) applications such as system
automation, predictive maintenance, and anomaly detection have come into the spotlight of …

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2023 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

Analysis of augmentation methods for RF fingerprinting under impaired channels

C Comert, M Kulhandjian, OM Gul, A Touazi… - Proceedings of the …, 2022 - dl.acm.org
Cyber-physical systems such as autonomous vehicle networks are considered to be critical
infrastructures in various applications. However, their mission critical deployment makes …

Edge learning for 6g-enabled internet of things: A comprehensive survey of vulnerabilities, datasets, and defenses

MA Ferrag, O Friha, B Kantarci… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …

Fine-grained augmentation for RF fingerprinting under impaired channels

OM Gul, M Kulhandjian, B Kantarci… - 2022 IEEE 27th …, 2022 - ieeexplore.ieee.org
Critical infrastructures such as connected and au-tonomous vehicles, are susceptible to
cyber attacks due to their mission-critical deployment. To ensure security by design, radio …

Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?

F Klement, S Katzenbeisser, V Ulitzsch… - arXiv preprint arXiv …, 2022 - arxiv.org
The Open RAN architecture is a promising and future-oriented architecture. It is intended to
open up the radio access network (RAN) and enable more innovation and competition in the …

Generative adversarial networks for malware detection: a survey

A Dunmore, J Jang-Jaccard, F Sabrina… - arXiv preprint arXiv …, 2023 - arxiv.org
Since their proposal in the 2014 paper by Ian Goodfellow, there has been an explosion of
research into the area of Generative Adversarial Networks. While they have been utilised in …