4.6 Article

Active Learning Based Adversary Evasion Attacks Defense for Malwares in the Internet of Things

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Distribution Bias Aware Collaborative Generative Adversarial Network for Imbalanced Deep Learning in Industrial IoT

Xiaokang Zhou et al.

Summary: In this article, we propose a distribution bias aware collaborative GAN (DB-CGAN) model for imbalanced deep learning in industrial IoT. By introducing a complementary classifier and a data augmentation algorithm, the model can effectively handle the distribution bias between the generated data and the original data, resulting in significantly improved classification accuracy.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Fast and Accurate Deep Learning Framework for Secure Fault Diagnosis in the Industrial Internet of Things

Youcef Djenouri et al.

Summary: This article introduces a new deep learning framework that integrates convolution neural network and regression models for fault diagnosis in electrical power systems. The framework includes three main steps: data preparation, object detection, and hyperparameter optimization. Inspired by deep learning and evolutionary computation techniques, different strategies have been proposed in each step of the process. Experimental evaluation using well-known datasets and a large power system shows that the proposed approach outperforms existing solutions in terms of runtime and accuracy.

IEEE INTERNET OF THINGS JOURNAL (2023)

Review Computer Science, Artificial Intelligence

Adversarial example detection for DNN models: a review and experimental comparison

Ahmed Aldahdooh et al.

Summary: Deep learning has achieved great success in many human-related tasks and has been widely adopted in computer vision applications. Defense and detection of adversarial examples pose challenges in safety-critical applications. Existing literature proposes various countermeasures, but there is limited focus on detection methods for adversarial examples. This paper provides a survey on test-time evasion attack detection methods for neural network classifiers in image classification tasks, including experimental results of eight state-of-the-art detectors on four datasets.

ARTIFICIAL INTELLIGENCE REVIEW (2022)

Article Computer Science, Hardware & Architecture

Mitigating adversarial evasion attacks of ransomware using ensemble learning

Usman Ahmed et al.

Summary: Ransomware poses a significant cybersecurity threat by extorting money from users through device and data lockout. This study proposes a hybrid approach that combines monitoring different features and utilizing ensemble machine learning analyzers to classify and detect ransomware behavior, aiming to mitigate adversarial evasion attacks.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Information Systems

PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices

Muhammad Aman et al.

Summary: This article introduces a hybrid attestation technique, PRoM, for multicore Internet of Things devices, which ensures security against roving malware and high availability. Experimental results show that PRoM is more effective in terms of execution time compared to other attestation techniques.

IEEE SYSTEMS JOURNAL (2022)

Article Engineering, Multidisciplinary

Deep Learning-Embedded Social Internet of Things for Ambiguity-Aware Social Recommendations

Zhiwei Guo et al.

Summary: With the increasing demand for personalized social services, researchers propose a deep learning-embedded social Internet of Things (IoT) solution to address the data management and preference ambiguity issues in social recommendation. Experimental results show that the proposed solution outperforms benchmark methods and exhibits good robustness.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks

Muhammad Naveed Aman et al.

Summary: This article presents a secure patching framework for IoT, using remote attestation and physical unclonable functions (PUFs) to control and mitigate malware propagation.

IEEE SYSTEMS JOURNAL (2022)

Proceedings Paper Computer Science, Information Systems

Systematic Review on Various Techniques of Android Malware Detection

Dharmesh D. Dave et al.

Summary: Smartphones have become the fourth basic necessity for humans, and the number of Android malware is increasing. This paper systematically reviews relevant studies from 2017 to 2020, assesses the detection capabilities of different techniques and machine learning models for Android malware, and discusses possible solutions to improve detection capabilities.

COMPUTING SCIENCE, COMMUNICATION AND SECURITY (2022)

Article Computer Science, Information Systems

Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments

Jerry Chun-Wei Lin et al.

Summary: The next revolution in the smart industry will be driven by the emergence of Industrial Internet of Things (IoT) and 5G/6G technology, changing our perspective on information and communication. Security of data and privacy of information remain significant challenges in critical and high-sensitive environments. An ant colony optimization approach is proposed to secure 6G IoT networks, aiming to protect confidential and sensitive information.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Large-Scale High-Utility Sequential Pattern Analytics in Internet of Things

Gautam Srivastava et al.

Summary: This paper presents a four-stage MapReduce framework based on the Spark platform for high-utility sequential pattern mining, which is shown to create a more efficient and faster mining performance for dealing with large data sets.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing

Afifa Maryam et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Theory & Methods

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

Xiao Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Review Computer Science, Information Systems

A Review of Android Malware Detection Approaches Based on Machine Learning

Kaijun Liu et al.

IEEE ACCESS (2020)

Article Chemistry, Analytical

Adversarial Samples on Android Malware Detection Systems for IoT Systems

Xiaolei Liu et al.

SENSORS (2019)

Proceedings Paper Computer Science, Information Systems

IMIAD: Intelligent Malware Identification for Android Platform

Syed Jawad Hussain et al.

2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) (2019)

Article Computer Science, Software Engineering

Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware

Joshua Garcia et al.

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2018)

Article Computer Science, Artificial Intelligence

Quantifying the resilience of machine learning classifiers used for cyber security

Ziv Katzir et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

Picking on the family: Disrupting android malware triage by forcing misclassification

Alejandro Calleja et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning

Anshul Arora et al.

MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (2018)

Article Computer Science, Theory & Methods

Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique

Yinxing Xue et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Drebin: Effective and Explainable Detection of Android Malware in Your Pocket

Daniel Arp et al.

21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)

Article Computer Science, Artificial Intelligence

Feature selection via maximizing global information gain for text classification

Changxing Shang et al.

KNOWLEDGE-BASED SYSTEMS (2013)