Privacy preservation using machine learning in the internet of things

S El-Gendy, MS Elsayed, A Jurcut, MA Azer - Mathematics, 2023 - mdpi.com
The internet of things (IoT) has prepared the way for a highly linked world, in which
everything is interconnected, and information exchange has become more easily accessible …

ESIA: An efficient and stable identity authentication for internet of vehicles

H Luo, J Zhang, X Li, Z Li, H Yu, G Sun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Decentralized, tamper-proof blockchain is regarded as a solution to a challenging
authentication issue in the Internet of Vehicles (IoVs). However, the consensus time and …

Toward incentivizing fog-based privacy-preserving mobile crowdsensing in the Internet of Vehicles

G Sun, S Sun, H Yu, M Guizani - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
In the face of a massive number of vehicular users, a data collection paradigm based on
vehicular crowdsensing requires an effective means of attracting participants. Thus, the …

Video surveillance on mobile edge networks—a reinforcement-learning-based approach

H Hu, H Shan, C Wang, T Sun, X Zhen… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Video surveillance systems or Internet of Multimedia Things are playing a more and more
important role in our daily life. To obtain useful surveillance information timely and …

Reinforcement learning based mobile offloading for cloud-based malware detection

X Wan, G Sheng, Y Li, L Xiao… - GLOBECOM 2017-2017 …, 2017 - ieeexplore.ieee.org
Cloud-based malware detection improves the detection performance for mobile devices that
offload their malware detection tasks to security servers with much larger malware database …

A review of cloud-based malware detection system: Opportunities, advances and challenges

Ö Aslan, M Ozkan-Okay, D Gupta - European Journal of Engineering and …, 2021 - ej-eng.org
Cloud computing has an important role in all aspects of storing information and providing
services online. It brings several advantages over traditional storing and sharing schema …

An adaptive method based on contextual anomaly detection in internet of things through wireless sensor networks

X Yu, H Lu, X Yang, Y Chen, H Song… - … Journal of Distributed …, 2020 - journals.sagepub.com
With the widespread propagation of Internet of Things through wireless sensor networks,
massive amounts of sensor data are being generated at an unprecedented rate, resulting in …

HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs

S Shen, H Zhou, S Feng, L Huang, J Liu, S Yu… - Journal of Network and …, 2019 - Elsevier
Heterogeneous wireless sensor networks (HWSNs), as blocks of the Internet of Things, are
vulnerable to malware diffusion breaking the data confidentiality and service availability …

Edge-based IIoT malware detection for mobile devices with offloading

X Deng, X Pei, S Tian, L Zhang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The advent of 5G brought new opportunities to leapfrog beyond current Industrial Internet of
Things (IoT). However, the ever-growing IoT has also attracted adversaries to develop new …

Penetration frameworks and development issues in secure mobile application development: A systematic literature review

IU Haq, TA Khan - IEEE Access, 2021 - ieeexplore.ieee.org
The invention of smartphones has opened a new market for mobile application
development. Amateur android app developers often do not possess knowledge of the latest …