4.8 Article

AI-Assisted Trustworthy Architecture for Industrial IoT Based on Dynamic Heterogeneous Redundancy

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Trustworthy Target Tracking With Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT

Jiwei Zhang et al.

Summary: This article proposes a framework called DRLTrack for mobile target tracking in edge-assisted IoT platform using collaborative deep reinforcement learning. DRLTrack aims to achieve high quality tracking and resource-efficient network performance. By employing a large number of IoT devices, DRLTrack is able to maintain an area around the target and demonstrate reliable performance even under cyberattacks.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

A Blockchain-Based Machine Learning Framework for Edge Services in IIoT

Youliang Tian et al.

Summary: This article proposes a blockchain-based machine learning framework for edge services in the Industrial Internet of Things (IIoT) to address the challenges of privacy leakage and insufficient model accuracy. By constructing smart contracts, multiparty participation in edge services is encouraged to improve data processing efficiency. Additionally, an aggregation strategy is proposed to verify and aggregate model parameters, ensuring the accuracy of decision tree models. Theoretical analysis and simulation experiments demonstrate that the BML-ES framework is secure, effective, and efficient, better suited for improving the accuracy of edge services in IIoT.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

Trustworthiness in Industrial IoT Systems Based on Artificial Intelligence

Zhihan Lv et al.

Summary: A method for automatically assessing the reliability of CPS is proposed in this study, utilizing a framework based on machine learning and an online ranking algorithm. Additionally, a trusted robust intelligent control strategy and intelligent prediction model for CPS are introduced.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Blockchain-Based Edge Computing Resource Allocation in IoT: A Deep Reinforcement Learning Approach

Ying He et al.

Summary: This article discusses the challenges posed by the exponential growth of IoT devices to the computing paradigm, proposing an edge-centric computing framework to address the demands. Blockchain can address the issue of trust absence, while also identifying security and privacy as the main challenges of edge computing.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Electrical & Electronic

Moving-Target Defense Against Cyber-Physical Attacks in Power Grids via Game Theory

Subhash Lakshminarayana et al.

Summary: This study proposes a moving target defense strategy to detect coordinated cyber-physical attacks against power grids. By actively perturbing the grid's transmission line reactances and identifying the best subset of links to perturb, the approach is effective in detecting and reducing the operator's defense cost.

IEEE TRANSACTIONS ON SMART GRID (2021)

Article Engineering, Electrical & Electronic

Efficient Blockchain-Enabled Large Scale Parked Vehicular Computing With Green Energy Supply

Yinglei Teng et al.

Summary: This paper proposes a Blockchain-enabled Large-scale Parked Vehicular Computing architecture to utilize solar energy and vehicular computational resources. An integrated optimization framework is presented to efficiently utilize distributed resources by leveraging green energy and service latency limit. The proposed scheme achieves a balanced performance between service latency and distributed resources while reducing battery depreciation costs.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Artificial Intelligence

Application of deep reinforcement learning to intrusion detection for supervised problems

Manuel Lopez-Martin et al.

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Article Engineering, Civil

Multi-Agent Deep Reinforcement Learning for Large-Scale Traffic Signal Control

Tianshu Chu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2020)

Article Computer Science, Information Systems

A context-aware robust intrusion detection system: a reinforcement learning-based approach

Kamalakanta Sethi et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Article Engineering, Multidisciplinary

A Deep Reinforcement Learning Method for Pricing Electric Vehicles With Discrete Charging Levels

Dawei Qiu et al.

IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS (2020)

Article Computer Science, Information Systems

DEEPGUARD: Efficient Anomaly Detection in SDN With Fine-Grained Traffic Flow Monitoring

Trung V. Phan et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Telecommunications

Dynamic Spectrum Interaction of UAV Flight Formation Communication With Priority: A Deep Reinforcement Learning Approach

Yun Lin et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2020)

Article Computer Science, Information Systems

DeepSensing: A Novel Mobile Crowdsensing Framework With Double Deep Q-Network and Prioritized Experience Replay

Xi Tao et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

A Novel Model of Mimic Defense Based on Minimal L-Order Error Probability

Guoxi Chen et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Finding key players in complex networks through deep reinforcement learning

Changjun Fan et al.

NATURE MACHINE INTELLIGENCE (2020)

Article Engineering, Electrical & Electronic

Interference Management for Cellular-Connected UAVs: A Deep Reinforcement Learning Approach

Ursula Challita et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Hardware & Architecture

SECURITY IN MOBILE EDGE CACHING WITH REINFORCEMENT LEARNING

Liang Xiao et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Mimic defense: a designed-in cybersecurity defense framework

Hongchao Hu et al.

IET INFORMATION SECURITY (2018)

Article Computer Science, Information Systems

Cloud-Based Malware Detection Game for Mobile Devices with Offloading

Liang Xiao et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)

Article Engineering, Electrical & Electronic

PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks

Liang Xiao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Computer Science, Hardware & Architecture

Power control with reinforcement learning in cooperative cognitive radio networks against jamming

Liang Xiao et al.

JOURNAL OF SUPERCOMPUTING (2015)