Learning-driven lossy image compression: A comprehensive survey

S Jamil, MJ Piran, MU Rahman, OJ Kwon - Engineering Applications of …, 2023 - Elsevier
In the field of image processing and computer vision (CV), machine learning (ML)
architectures are widely used. Image compression problems can be solved using …

[HTML][HTML] A Fuzzy Logic based feature engineering approach for Botnet detection using ANN

C Joshi, RK Ranjan, V Bharti - Journal of King Saud University-Computer …, 2022 - Elsevier
In recent years, Botnet has become one of the most dreadful type of malicious entity.
Because of the hidden and carrying capacity of Botnet, the detection task has become a real …

[HTML][HTML] Articles A Comprehensive Survey on Blockchain for Secure IoT-enabled Smart City beyond 5G: Approaches, Processes, Challenges, and Opportunities

SK Singh, AE Azzaoui, KKR Choo, LT Yang… - Hum.-Centric Comput …, 2023 - hcisj.com
Established and emerging technologies such as 5G, Internet of Things (IoT), and blockchain
will play an increasingly significant role in smart city applications, which reinforce the …

Machine and deep learning approaches for IoT attack classification

A Nascita, F Cerasuolo, D Di Monda… - … -IEEE Conference on …, 2022 - ieeexplore.ieee.org
In recent years, Internet of Things (IoT) traffic has increased dramatically and is expected to
grow further in the next future. Because of their vulnerabilities, IoT devices are often the …

IoT-based smart cities: A bibliometric analysis and literature review

K Szum - Engineering Management in Production and Services, 2021 - sciendo.com
Modern cities face many challenges related to globalisation, metropolisation and
digitalisation. The smart city concept, which has been gaining popularity in recent years, is …

Robust stacking ensemble model for darknet traffic classification under adversarial settings

H Mohanty, AH Roudsari, AH Lashkari - Computers & Security, 2022 - Elsevier
Encrypted traffic tunnelled by Tor or VPN is referred to as darknet traffic. The ability to detect,
identify, and characterize darknet traffic is critical for detecting network traffic generated by a …

Machine learning enabled industrial iot security: Challenges, trends and solutions

C Ni, SC Li - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract Introduction: The increasingly integrated Industrial IoT (IIoT) with industrial systems
brings benefits such as intelligent analytics, predictive maintenance, and remote monitoring …

Detecting IoT attacks using an ensemble machine learning model

V Tomer, S Sharma - Future Internet, 2022 - mdpi.com
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things
(IoT) devices in homes, offices, transportation, healthcare, and other locations. By …

Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications

MM Rashid, J Kamruzzaman, MM Hassan, T Imam… - Computers & …, 2022 - Elsevier
Abstract Intrusion Detection Systems (IDS) based on deep learning models can identify and
mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models …

Application of artificial intelligence to network forensics: Survey, challenges and future directions

S Rizvi, M Scanlon, J Mcgibney, J Sheppard - Ieee Access, 2022 - ieeexplore.ieee.org
Network forensics focuses on the identification and investigation of internal and external
network attacks, the reverse engineering of network protocols, and the uninstrumented …