Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements

L Alzubaidi, A Al-Sabaawi, J Bai… - … Journal of Intelligent …, 2023 - Wiley Online Library
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic
decision‐making (DM), these systems have found wide‐ranging applications across diverse …

IoT cybersecurity in 5G and beyond: a systematic literature review

S Pirbhulal, S Chockalingam, A Shukla… - International Journal of …, 2024 - Springer
Abstract The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature
of remote monitoring for different applications such as transportation, healthcare, and …

[PDF][PDF] 5G and Internet of Things—Integration Trends, Opportunities, and Future Research Avenues

AKMB Haque, MOM Zihad, MR Hasan - 5G and Beyond, 2023 - library.oapen.org
Abstract The Fifth Generation Communication System (5G) has revolutionized data (voice,
text, and hybrid) transmission and communication. Advanced communication protocol and …

[HTML][HTML] Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems

Y Harbi, K Medani, C Gherbi, Z Aliouat, S Harous - Sensors, 2024 - mdpi.com
Machine learning (ML) represents one of the main pillars of the current digital era,
specifically in modern real-world applications. The Internet of Things (IoT) technology is …

A Systematic Literature Review on 5G Security

I Sahni, A Kaur - arXiv preprint arXiv:2212.03299, 2022 - arxiv.org
It is expected that the creation of next-generation wireless networks would result in the
availability of high-speed and low-latency connectivity for every part of our life. As a result, it …

Comparative study of blockchain-based voting solutions

K Patel, D Ramoliya, K Sorathia, F Bhut - Intelligent Sustainable Systems …, 2022 - Springer
The election is one of the factors due to which democracy fails as a system in place. Today,
countries like India, the US, and even Japan are still facing accusations like vote rigging …

[PDF][PDF] Effective Response to Data Breaches: AI-Assisted Solutions for Modern Enterprises

H Umar, R Marchant - 2023 - researchgate.net
Data breaches pose significant risks to modern enterprises, resulting in financial loss,
reputational damage, and regulatory penalties. As cyber threats evolve, organizations must …

Role of Blockchain in Automation of Trending Industrial Technologies

A Patel, M Patel - 2024 8th International Conference on …, 2024 - ieeexplore.ieee.org
The distributed ledger aspect of blockchain technology has transformed traditional trade;
each record in this ledger is secured by cryptographic technique, making it more protected …

Unveiling the Potential of Local Outlier Factor in Credit Card Fraud Detection

A Jones, M Omar - … Journal of Informatics, Information System and …, 2026 - ojs.unikom.ac.id
This study evaluates the Local Outlier Factor (LOF) algorithm for credit card fraud detection,
emphasizing its effectiveness with imbalanced datasets. Unlike traditional methods that …

Integrating Artificial Intelligence and Blockchain Technology for Enhanced US Homeland Security

M Rele, D Patil, Y Boujoudar - 2023 3rd Intelligent …, 2023 - ieeexplore.ieee.org
Using artificial intelligence in homeland security enables the efficient investigation of
multiple data sets, resulting in enhanced threat detection and prevention. Artificial …