Cybersecurity of unmanned aerial vehicles: A survey

Z Yu, Z Wang, J Yu, D Liu, HH Song… - IEEE Aerospace and …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are unmanned aircrafts operated by radio remote control
and programmed control equipment. Due to their small size, low cost, and high flexibility …

Towards security threats of deep learning systems: A survey

Y He, G Meng, K Chen, X Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Deep learning has gained tremendous success and great popularity in the past few years.
However, deep learning systems are suffering several inherent weaknesses, which can …

Poisoning attacks and defenses on artificial intelligence: A survey

MA Ramirez, SK Kim, HA Hamadi, E Damiani… - arXiv preprint arXiv …, 2022 - arxiv.org
Machine learning models have been widely adopted in several fields. However, most recent
studies have shown several vulnerabilities from attacks with a potential to jeopardize the …

Can I trust the data I see? A Physician's concern on medical data in IoT health architectures

FT Jaigirdar, C Rudolph, C Bain - Proceedings of the Australasian …, 2019 - dl.acm.org
With the increasing advancement of Internet of Things (IoT) enabled systems, smart medical
devices open numerous opportunities for the healthcare sector. The success of using such …

A secure and extensible blockchain-based data provenance framework for the Internet of Things

M Sigwart, M Borkowski, M Peise, S Schulte… - Personal and Ubiquitous …, 2020 - Springer
As data collected and provided by Internet of Things (IoT) devices power an ever-growing
number of applications and services, it is crucial that this data can be trusted. Data …

Blockchain-based data provenance for the internet of things

M Sigwart, M Borkowski, M Peise, S Schulte… - Proceedings of the 9th …, 2019 - dl.acm.org
As more and more applications and services depend on data collected and provided by
Internet of Things (IoT) devices, it is of importance that such data can be trusted. Data …

A blockchain approach to ensuring provenance to outsourced cloud data in a sharing ecosystem

EB Sifah, Q Xia, KOBO Agyekum, H Xia… - IEEE Systems …, 2021 - ieeexplore.ieee.org
Cloud servers offer data owners the opportunityto upload and store encrypted data that
several data users can access. However, after outsourcing data to the cloud, data owners …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …

A cost-efficient iot forensics framework with blockchain

S Mercan, M Cebe, E Tekiner, K Akkaya… - … on blockchain and …, 2020 - ieeexplore.ieee.org
IoT devices have been adopted widely in the last decade which enabled collection of
various data from different environments. Data storage poses challenges since the data may …

Prov-IoT: a security-aware IoT provenance model

FT Jaigirdar, C Rudolph, C Bain - 2020 IEEE 19th International …, 2020 - ieeexplore.ieee.org
A successful application of an Internet of Things (IoT) based network depends on the
accurate and successful delivery of a large amount of data collected from numerous …