相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Blockchain-Powered Decentralized and Secure Computing Paradigm
Gihan J. Mendis et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)
Private Machine Learning Classification Based on Fully Homomorphic Encryption
Xiaoqiang Sun et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)
Immutable autobiography of smart cars leveraging blockchain technology
Md Sadek Ferdous et al.
KNOWLEDGE ENGINEERING REVIEW (2020)
Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
Ismail Butun et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Security Services Using Blockchains: A State of the Art Survey
Tara Salman et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Internet of Things: A survey on machine learning-based intrusion detection approaches
Kelton A. P. da Costa et al.
COMPUTER NETWORKS (2019)
Privacy-Preserving Machine Learning: Threats and Solutions
Mohammad Al-Rubaie et al.
IEEE SECURITY & PRIVACY (2019)
Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition
Gaurav Goswami et al.
INTERNATIONAL JOURNAL OF COMPUTER VISION (2019)
Blockchain-Based Secure Time Protection Scheme in IoT
Kai Fan et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
Muneeb Ul Hassan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
Nour Moustafa et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities
Meng Shen et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Survey on blockchain for Internet of Things
Xu Wang et al.
COMPUTER COMMUNICATIONS (2019)
Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch
Xuyang Jing et al.
INFORMATION FUSION (2019)
Privacy in the age of medical big data
W. Nicholson Price et al.
NATURE MEDICINE (2019)
Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection
Omar E. Elejla et al.
COMPUTATIONAL SCIENCE AND TECHNOLOGY (2019)
Blockchain for AI: Review and Open Research Challenges
Khaled Salah et al.
IEEE ACCESS (2019)
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
Muhammad Ikram et al.
PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT (2019)
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
Muhammad Salek Ali et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists
Benjamin Zi Hao Zhao et al.
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)
Authorization transparency for accountable access to IoT services
Luca Ferretti et al.
2019 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT 2019) (2019)
Towards a Cybersecurity Investment Assessment method using Primitive Cognitive Network Process
Kevin Kam Fung Yuen
2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION (ICAIIC 2019) (2019)
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading
Muhammad Ikram et al.
WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019) (2019)
Network Intrusion Detection for IoT Security Based on Learning Techniques
Nadia Chaabouni et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
Vikas Hassija et al.
IEEE ACCESS (2019)
Anatomy of Threats to the Internet of Things
Imran Makhdoom et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly
Fan Liang et al.
IEEE ACCESS (2019)
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams
Nurzhan Zhumabekuly Aitzhan et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Internet of things security: A top-down survey
Djamel Eddine Kouicem et al.
COMPUTER NETWORKS (2018)
Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing
Abebe Abeshu Diro et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
Secure and Energy-Efhcient Handover in Fog Networks Using Blockchain-Based DMM
Vishal Sharma et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
Muhamad Erza Aminanto et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
Lun Li et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)
Preserving Model Privacy for Machine Learning in Distributed Systems
Qi Jia et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2018)
Malware Threats and Detection for Industrial Mobile-IoT Networks
Shaila Sharmeen et al.
IEEE ACCESS (2018)
A Review on the Use of Blockchain for the Internet of Things
Tiago M. Fernandez-Carames et al.
IEEE ACCESS (2018)
Consortium Blockchain-Based Malware Detection in Mobile Devices
Jingjing Gu et al.
IEEE ACCESS (2018)
A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT
Pradip Kumar Sharma et al.
IEEE ACCESS (2018)
Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems
Rui Guo et al.
IEEE ACCESS (2018)
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
Qiang Liu et al.
IEEE ACCESS (2018)
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications
Jingzhong Wang et al.
IEEE ACCESS (2018)
DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features
Wei Wang et al.
IEEE ACCESS (2018)
A Novel Dynamic Android Malware Detection System With Ensemble Learning
Pengbin Feng et al.
IEEE ACCESS (2018)
When Intrusion Detection Meets Blockchain Technology: A Review
Weizhi Meng et al.
IEEE ACCESS (2018)
Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications
Abebe Diro et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning
Bo Feng et al.
IEEE NETWORK (2018)
IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?
Liang Xiao et al.
IEEE SIGNAL PROCESSING MAGAZINE (2018)
Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things
S. Prabavathy et al.
JOURNAL OF COMMUNICATIONS AND NETWORKS (2018)
Blockchain and IoT Integration: A Systematic Survey
Alfonso Panarello et al.
SENSORS (2018)
A Privacy-Preserving Trust Model Based on Blockchain for VANETs
Zhaojun Lu et al.
IEEE ACCESS (2018)
Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions
Xiaoyang Zhu et al.
SENSORS (2018)
Securing Insulin Pump System Using Deep Learning and Gesture Recognition
Usman Ahmad et al.
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)
Incognito: A Method for Obfuscating Web Data
Rahat Masood et al.
WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)
Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs
Tao Zhang et al.
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2018)
Blockchain-based secure firmware update for embedded devices in an Internet of Things environment
Boohyung Lee et al.
JOURNAL OF SUPERCOMPUTING (2017)
Physical-Layer Authentication Based on Extreme Learning Machine
Ning Wang et al.
IEEE COMMUNICATIONS LETTERS (2017)
DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks
Pradip Kumar Sharma et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains
Jiawen Kang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM
Hui Zhu et al.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2017)
Machine Learning-Based Malicious Application Detection of Android
Linfeng Wei et al.
IEEE ACCESS (2017)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
Mohammed A. Ambusaidi et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
Liang Xiao et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)
Blockchains and Smart Contracts for the Internet of Things
Konstantinos Christidis et al.
IEEE ACCESS (2016)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Zhiyuan Tan et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)