Label sanitization against label flipping poisoning attacks

A Paudice, L Muñoz-González, EC Lupu - ECML PKDD 2018 Workshops …, 2019 - Springer
Many machine learning systems rely on data collected in the wild from untrusted sources,
exposing the learning algorithms to data poisoning. Attackers can inject malicious data in …

Poisoning attacks with generative adversarial nets

L Muñoz-González, B Pfitzner, M Russo… - arXiv preprint arXiv …, 2019 - arxiv.org
Machine learning algorithms are vulnerable to poisoning attacks: An adversary can inject
malicious points in the training dataset to influence the learning process and degrade the …

Haunted house: physical smart home event verification in the presence of compromised sensors

S Birnbach, S Eberz, I Martinovic - ACM Transactions on Internet of …, 2022 - dl.acm.org
In this article, we verify physical events using data from an ensemble of smart home sensors.
This approach both protects against event sensor faults and sophisticated attackers. To …

A novel diagnosis scheme against collusive false data injection attack

J Hu, X Yang, L Yang - Sensors, 2023 - mdpi.com
The collusive false data injection attack (CFDIA) is a false data injection attack (FIDA), in
which false data are injected in a coordinated manner into some adjacent pairs of captured …

Risk and threat mitigation techniques in internet of things (IoT) environments: a survey

M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
Security in the Internet of Things (IoT) remains a predominant area of concern. Although
several other surveys have been published on this topic in recent years, the broad spectrum …

Multi-Resolution Analysis with Visualization to Determine Network Attack Patterns

DH Jeong, BK Jeong, SY Ji - Applied Sciences, 2023 - mdpi.com
Analyzing network traffic activities is imperative in network security to detect attack patterns.
Due to the complex nature of network traffic event activities caused by continuously …

“Network Sentiment” Framework to Improve Security and Privacy for Smart Home

T Pecorella, L Pierucci, F Nizzi - Future Internet, 2018 - mdpi.com
A Smart Home is characterized by the presence of a huge number of small, low power
devices, along with more classical devices. According to the Internet of Things (IoT) …

[PDF][PDF] Trust modeling in wireless sensor networks: state of the art

MM AlQahatani, MGM Mostafa - Journal of Information …, 2018 - journals.nauss.edu.sa
Wireless sensor networks (WSNs) is the backbone of the new generation of internet of things
(IoT). WSNs are growing rapidly and security threats are increasingly growing as well. Trust …

False data detection for fog and internet of things networks

R Fantacci, F Nizzi, T Pecorella, L Pierucci, M Roveri - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) context brings new security issues due to billions of smart end-
devices both interconnected in wireless networks and connected to the Internet by using …

Exploiting correlations to detect false data injections in low-density wireless sensor networks

Z Hau, EC Lupu - Proceedings of the 5th on Cyber-Physical System …, 2019 - dl.acm.org
We propose a novel framework to detect false data injections in a low-density sensor
environment with heterogeneous sensor data. The proposed detection algorithm learns how …