Machine-learning-enabled intrusion detection system for cellular connected UAV networks

R Shrestha, A Omidkar, SA Roudi, R Abbas, S Kim - Electronics, 2021 - mdpi.com
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its wide
variety of applications in public and private sector from parcel delivery to wildlife …

A radio anomaly detection algorithm based on modified generative adversarial network

X Zhou, J Xiong, X Zhang, X Liu… - IEEE Wireless …, 2021 - ieeexplore.ieee.org
Detecting ever increasing anomalous signals is critical to effective spectrum management. In
this letter, we present a radio anomaly detection algorithm based on modified generative …

A novel insider attack and machine learning based detection for the internet of things

M Chowdhury, B Ray, S Chowdhury… - ACM Transactions on …, 2021 - dl.acm.org
Due to the widespread functional benefits, such as supporting internet connectivity, having
high visibility and enabling easy connectivity between sensors, the Internet of Things (IoT) …

Lightweight anomaly detection scheme using incremental principal component analysis and support vector machine

NM Zamry, A Zainal, MA Rassam, EH Alkhammash… - Sensors, 2021 - mdpi.com
Wireless Sensors Networks have been the focus of significant attention from research and
development due to their applications of collecting data from various fields such as smart …

CELOF: Effective and fast memory efficient local outlier detection in high-dimensional data streams

L Chen, W Wang, Y Yang - Applied Soft Computing, 2021 - Elsevier
Outlier detection is an important and challenging problem in industrial automation, where
data are often collected in large amounts but with little labeled information. To realize real …

ELOF: fast and memory-efficient anomaly detection algorithm in data streams

Y Yang, L Chen, CJ Fan - Soft Computing, 2021 - Springer
Anomaly detection in multivariate data is an import research field. Many studies have been
proposed aiming to develop the local outlier factor (LOF). However, the existing LOF-based …

Security vulnerabilities and intelligent solutions for iomt systems

J Jeyavel, T Parameswaran, JM Mannan… - Internet of Medical …, 2021 - Springer
Abstract The Internet of Medical Things (IoMT) is one the most practical and useful
applications of the Internet of Things (IoT), achieved by connecting medical devices and …

[PDF][PDF] DAM: a theoretical framework for SensorSecurity in IoT applications

B Gulzar, A Gupta - International Journal of Next-Generation …, 2021 - researchgate.net
As IoT applications are pervasively deployed across multiple domains, the potential impact
of their security vulnerabilities are also accentuated. Sensor nodes represent a critical …

A grid partition-based local outlier factor for data stream processing

R Alsini, O Alghushairy, X Ma, T Soule - … from ICAI'20 and ACC'20, 2021 - Springer
Outlier detection is getting significant attention in the research field of big data. Detecting the
outlier is important in various applications such as communication, finance, fraud detection …

Real-time FPGA-Based outlier detection using autoencoder and LSTM

NA Mohamed, JR Cavallaro - 2021 55th Asilomar Conference …, 2021 - ieeexplore.ieee.org
The world we live in and the one we are designing for tomorrow is based on monitoring
physical systems, specifically the capability of continuously gathering fine-grained …