EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid

J Tian, C Shen, B Wang, C Ren, X Xia… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Although conventional false data injection attacks can circumvent the detection of bad data
detection (BDD) in sustainable power grid cyber physical systems, they are easily detected …

[HTML][HTML] An optimized ensemble model with advanced feature selection for network intrusion detection

A Ahmed, M Asim, I Ullah, AA Ateya - PeerJ Computer Science, 2024 - peerj.com
In today's digital era, advancements in technology have led to unparalleled levels of
connectivity, but have also brought forth a new wave of cyber threats. Network Intrusion …

Emerging Blockchain and Reputation Management in Federated Learning: Enhanced Security and Reliability for Internet of Vehicles (IoV)

H Mun, K Han, HK Yeun, E Damiani… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Artificial intelligence (AI) technologies have been applied to the Internet of Vehicles (IoV) to
provide convenience services such as traffic flow prediction. However, concerns regarding …

ASRL: Adaptive Swarm Reinforcement Learning For Enhanced OSN Intrusion Detection

EK Boahen, RNA Sosu, SK Ocansey… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Online Social Networks (OSNs) face escalating security threats that imperil user privacy.
Conventional Deep Learning methods, relying predominantly on fixed learning rates …

Clients Eligibility-Based Lightweight Protocol in Federated Learning: An IDS Use-Case

M Asad, S Otoum, S Shaukat - IEEE Transactions on Network …, 2024 - ieeexplore.ieee.org
Federated learning (FL) enables clients to train models locally, enhancing privacy by
avoiding data centralization. Traditional FL assumes all clients have adequate resources, an …

Continuous Management of Machine Learning-Based Application Behavior

M Anisetti, CA Ardagna, N Bena… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Modern applications are increasingly driven by Machine Learning (ML) models whose non-
deterministic behavior is affecting the entire application life cycle from design to operation …

Context-Aware Spatiotemporal Poisoning Attacks on Wearable-Based Activity Recognition

AR Shahid, SM Hasan, A Imteaj… - IEEE INFOCOM 2024 …, 2024 - ieeexplore.ieee.org
The rapid progress in wearable sensors, smartphones equipped with sensors, and
seamless cloud integration has ignited significant research into the creation of IoT-driven …

Evaluation of machine learning models for mapping soil salinity in Ben Tre province, Vietnam

PT Khanh, TTH Ngoc, S Pramanik - Multimedia Tools and Applications, 2024 - Springer
In most tropical climates, one of the most serious natural dangers that negatively impacts
agricultural operations in coastal regions is increasing sea levels because of climate …

Timber! Poisoning Decision Trees

S Calzavara, L Cazzaro, M Vettori - arXiv preprint arXiv:2410.00862, 2024 - arxiv.org
We present Timber, the first white-box poisoning attack targeting decision trees. Timber is
based on a greedy attack strategy leveraging sub-tree retraining to efficiently estimate the …

Managing ML-Based Application Non-Functional Behavior: A Multi-Model Approach

M Anisetti, CA Ardagna, N Bena, E Damiani… - arXiv preprint arXiv …, 2023 - arxiv.org
Modern applications are increasingly driven by Machine Learning (ML) models whose non-
deterministic behavior is affecting the entire application life cycle from design to operation …