A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions

X Yin, Y Zhu, J Hu - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The past four years have witnessed the rapid development of federated learning (FL).
However, new privacy concerns have also emerged during the aggregation of the …

Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G

M Vaezi, A Azari, SR Khosravirad… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The next wave of wireless technologies is proliferating in connecting things among
themselves as well as to humans. In the era of the Internet of Things (IoT), billions of …

Blockchain meets metaverse and digital asset management: A comprehensive survey

VT Truong, L Le, D Niyato - Ieee Access, 2023 - ieeexplore.ieee.org
Envisioned to be the next-generation Internet, the metaverse has been attracting enormous
attention from both the academia and industry. The metaverse can be viewed as a 3D …

Empowering things with intelligence: a survey of the progress, challenges, and opportunities in artificial intelligence of things

J Zhang, D Tao - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
In the Internet-of-Things (IoT) era, billions of sensors and devices collect and process data
from the environment, transmit them to cloud centers, and receive feedback via the Internet …

A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things

MK Hasan, TM Ghazal, RA Saeed… - IET …, 2022 - Wiley Online Library
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …

CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques

M Shafiq, Z Tian, AK Bashir, X Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

A Survey on Standards for Interoperability and Security in the Internet of Things

E Lee, YD Seo, SR Oh, YG Kim - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Recently, there has been an increase in studies relating to the Internet of Things (IoT) in
various fields, such as smart cities, smart homes, smart factories, and healthcare. In an IoT …

[HTML][HTML] SmartHealth: An intelligent framework to secure IoMT service applications using machine learning

S Rani, S Kumar, A Kataria, H Min - ICT Express, 2024 - Elsevier
Due to the complex functioning of Smart Healthcare Systems (SHS), many security concerns
have been raised in the past. It provisions the attackers to hamper the working of SHS in a …

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things

G Wu, L Xie, H Zhang, J Wang, S Shen, S Yu - Journal of Network and …, 2023 - Elsevier
Abstract Social Internet of Things (SIoT) with deep integration of Internet of Things and social
networks has become a target of a large number of hackers who attempt to spread viruses …