A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
Reliability of autonomous Internet of Things systems with intrusion detection attack-defense game design
In this article we develop an intrusion detection attack-defense game for Internet of Things
(IoT) systems for which autonomous IoT devices collaboratively solve a problem. We …
(IoT) systems for which autonomous IoT devices collaboratively solve a problem. We …
Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks
We propose and analyze trust-based cooperative spectrum sensing data fusion schemes
against spectrum sensing data falsification attacks in cognitive radio networks. We first …
against spectrum sensing data falsification attacks in cognitive radio networks. We first …
Distributed clustering for secure multitask estimation based on adaptive task switching
Consider adversarial multitask networks with a high cost of sharing genuine information,
where agents feed others unreliable information according to a time-varying probability …
where agents feed others unreliable information according to a time-varying probability …
Trust-based cooperative spectrum sensing against SSDF attacks in distributed cognitive radio networks
We propose and analyze a trust-based data fusion scheme against spectrum sensing data
falsification attacks in a distributed cognitive radio network. Our trust-based data fusion …
falsification attacks in a distributed cognitive radio network. Our trust-based data fusion …
Information reliability in complex multitask networks
In this paper, we study the performance of multitask distributed networks where sharing
genuine information is costly. We formulate an information credibility model which links the …
genuine information is costly. We formulate an information credibility model which links the …
Information credibility modeling in cooperative networks: equilibrium and mechanism design
In a cooperative network, the user equipment (UE) shares information for cooperatively
achieving a common goal. However, owing to the concerns of privacy or cost, UEs may be …
achieving a common goal. However, owing to the concerns of privacy or cost, UEs may be …
Trust-based data fusion mechanism design in cognitive radio networks
J Wang, R Chen - 2014 IEEE conference on communications …, 2014 - ieeexplore.ieee.org
Cognitive radio is a promising solution for spectrum scarcities in the future. Secondary users
(SUs) adopt cooperative sensing to learn the primary user's (PU's) occupancy activity. This …
(SUs) adopt cooperative sensing to learn the primary user's (PU's) occupancy activity. This …
On modeling of adversary behavior and defense for survivability of military MANET applications
In this paper we develop a methodology and report preliminary results for modeling
attack/defense behaviors for achieving high survivability of military mobile ad hoc networks …
attack/defense behaviors for achieving high survivability of military mobile ad hoc networks …
Information credibility equilibrium of cooperative networks
In a cooperative network the user equipment (UE) share information with each other for
cooperatively achieving a common goal. While owing to the concerns of privacy or cost, UEs …
cooperatively achieving a common goal. While owing to the concerns of privacy or cost, UEs …