Malicious code classification method based on deep residual network and hybrid attention mechanism for edge security

Y Shao, Y Lu, D Wei, J Fang, F Qin… - … and Mobile Computing, 2022 - Wiley Online Library
Edge computing is a feasible solution for effectively collecting and processing data in
industrial Internet of Things (IIoT) systems, and edge security is an important guarantee for …

Sensing, Estimation, and Security of the Frequency Spectrum Using Shallow and Deep Learning Techniques

MDM Valadão - 2024 - tede.ufam.edu.br
The frequency spectrum is a limited resource that has experienced a growing demand in
recent years, especially with the advent of 5G and 6G technologies. Spectrum sensing …

Adversarial Example Attacks in Internet of Things (IoT)

Y Gu, N Jiang, Y Chen, X Gong - … Conference on Edge Computing and IoT, 2022 - Springer
Abstract Recently, the Internet of Things (IoT) technology has made tremendous progress,
and it is beginning to enter many areas of social life, such as autonomous driving, medical …

Adversarial Training for Better Robustness

H Cao, M Xue - … Conference on Intelligent Edge Processing in the IoT …, 2022 - Springer
As the vulnerabilities of neural networks are gradually exposed, the security of deep
learning attracts the thoughtful attention of researchers. Adversarial training is a promising …