Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey

Y Wan, Y Qu, W Ni, Y Xiang, L Gao… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the greatly improved capabilities of devices, massive data, and increasing concern
about data privacy, Federated Learning (FL) has been increasingly considered for …

Biometrics for Industry 4.0: a survey of recent applications

C Lucia, G Zhiwei, N Michele - Journal of Ambient Intelligence and …, 2023 - Springer
Abstract The Fourth Industrial Revolution, also known as Industry 4.0, represents the rise of
digital industrial technology that is propagating at an exponential rate compared to the …

Water optimization technique for precision irrigation system using IoT and machine learning

DMM Vianny, A John, SK Mohan, A Sarlan… - Sustainable Energy …, 2022 - Elsevier
Water management system and energy optimization are most important for today's
agriculture. Precision irrigation manages the water utilization and reduces the utilization of …

SDN-assisted technique for traffic control and information execution in vehicular adhoc networks

H Tao, JM Zain, SB Band… - Computers and …, 2022 - Elsevier
Abstract Recently, applying Software-Defined Networking (SDN) in automotive industry has
sparked a lot of interest due to its capacity to ensure focused organization across the board …

Computational-intelligence-inspired adaptive opportunistic clustering approach for industrial IoT networks

P Chithaluru, F Al-Turjman, M Kumar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The major issues and challenges of the Industrial Internet of Things (IIoT) include network
resource management, self-organization; routing, mobility, scalability, security, and data …

[HTML][HTML] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the blockchain

H Pourrahmani, A Yavarinasab, AMH Monazzah… - Internet of Things, 2023 - Elsevier
The current advances in the Internet of Things (IoT) and the solutions being offered by this
technology have accounted IoT among the top ten technologies that will transform the global …

Cloud-based bug tracking software defects analysis using deep learning

T Hai, J Zhou, N Li, SK Jain, S Agrawal… - Journal of Cloud …, 2022 - Springer
Cloud technology is not immune to bugs and issue tracking. A dedicated system is required
that will extremely error prone and less cumbersome and must command a high degree of …

IoT security vulnerabilities and defensive measures in Industry 4.0

K Manasa, LMI Leo Joseph - Artificial Intelligence and Cyber Security in …, 2023 - Springer
Abstract The Internet of things (IoT) has been emerging technology for the past decade. IoT
can be defined as the network connecting objects to the Internet in the physical world. IoT …

A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario

AH Eyeleko, T Feng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
We have witnessed significant technological advancement over the past few years,
including the Internet of Things (IoT). The IoT's ability to connect consumer appliances to the …

A new data-preprocessing-related taxonomy of sensors for iot applications

PD Rosero-Montalvo, VF López-Batista… - Information, 2022 - mdpi.com
IoT devices play a fundamental role in the machine learning (ML) application pipeline, as
they collect rich data for model training using sensors. However, this process can be affected …