An overview of artificial intelligence ethics

C Huang, Z Zhang, B Mao, X Yao - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Artificial intelligence (AI) has profoundly changed and will continue to change our lives. AI is
being applied in more and more fields and scenarios such as autonomous driving, medical …

A survey of privacy attacks in machine learning

M Rigaki, S Garcia - ACM Computing Surveys, 2023 - dl.acm.org
As machine learning becomes more widely used, the need to study its implications in
security and privacy becomes more urgent. Although the body of work in privacy has been …

Attack classification of imbalanced intrusion data for IoT network using ensemble-learning-based deep neural network

A Thakkar, R Lohiya - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the increase in popularity of Internet of Things (IoT) and the rise in interconnected
devices, the need to foster effective security mechanism to handle vulnerabilities and risks in …

[HTML][HTML] A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks

M Liyanage, QV Pham, K Dev, S Bhattacharya… - Journal of Network and …, 2022 - Elsevier
Faced with the rapid increase in smart Internet-of-Things (IoT) devices and the high demand
for new business-oriented services in the fifth-generation (5G) and beyond network, the …

The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges

M Waqas, S Tu, Z Halim, SU Rehman, G Abbas… - Artificial Intelligence …, 2022 - Springer
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …

Realguard: A lightweight network intrusion detection system for IoT gateways

XH Nguyen, XD Nguyen, HH Huynh, KH Le - Sensors, 2022 - mdpi.com
Cyber security has become increasingly challenging due to the proliferation of the Internet of
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …

A blockchain-based machine learning framework for edge services in IIoT

Y Tian, T Li, J **ong, MZA Bhuiyan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Edge services provide an effective and superior means of real-time transmissions and rapid
processing of information in the Industrial Internet of Things (IIoT). However, the continuous …

Data poisoning attacks against machine learning algorithms

FA Yerlikaya, Ş Bahtiyar - Expert Systems with Applications, 2022 - Elsevier
For the past decade, machine learning technology has increasingly become popular and it
has been contributing to many areas that have the potential to influence the society …

Normalizing flows for human pose anomaly detection

O Hirschorn, S Avidan - Proceedings of the IEEE/CVF …, 2023 - openaccess.thecvf.com
Video anomaly detection is an ill-posed problem because it relies on many parameters such
as appearance, pose, camera angle, background, and more. We distill the problem to …

A survey of robustness and safety of 2d and 3d deep learning models against adversarial attacks

Y Li, B **e, S Guo, Y Yang, B **ao - ACM Computing Surveys, 2024 - dl.acm.org
Benefiting from the rapid development of deep learning, 2D and 3D computer vision
applications are deployed in many safe-critical systems, such as autopilot and identity …