Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems
The communication and networking field is hungry for machine learning decision-making
solutions to replace the traditional model-driven approaches that proved to be not rich …
solutions to replace the traditional model-driven approaches that proved to be not rich …
[HTML][HTML] Security in product lifecycle of IoT devices: A survey
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …
challenges, which has lately demanded substantial consideration. Accordingly, certain …
CNN-based network intrusion detection against denial-of-service attacks
As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a
variety of fields including industry, national defense, and healthcare. Traditional intrusion …
variety of fields including industry, national defense, and healthcare. Traditional intrusion …
Intrusion detection in the iot under data and concept drifts: Online deep learning approach
OA Wahab - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Although the existing machine learning-based intrusion detection systems in the Internet of
Things (IoT) usually perform well in static environments, they struggle to preserve their …
Things (IoT) usually perform well in static environments, they struggle to preserve their …
Deep and reinforcement learning for automated task scheduling in large‐scale cloud computing systems
Cloud computing is undeniably becoming the main computing and storage platform for
today's major workloads. From Internet of things and Industry 4.0 workloads to big data …
today's major workloads. From Internet of things and Industry 4.0 workloads to big data …
Autonomous robotic manipulation: real‐time, deep‐learning approach for gras** of unknown objects
Recent advancement in vision‐based robotics and deep‐learning techniques has enabled
the use of intelligent systems in a wider range of applications requiring object manipulation …
the use of intelligent systems in a wider range of applications requiring object manipulation …
Analyzing strategies in a green e-commerce supply chain with return policy and exchange offer
Due to groundbreaking rise of e-commerce and growing trends of customers' environmental
mindfulness, recently, more and more manufacturers are willing to produce eco-friendly …
mindfulness, recently, more and more manufacturers are willing to produce eco-friendly …
Trust-driven reinforcement selection strategy for federated learning on IoT devices
Federated learning is a distributed machine learning approach that enables a large number
of edge/end devices to perform on-device training for a single machine learning model …
of edge/end devices to perform on-device training for a single machine learning model …
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats
Insider threats are a pernicious threat to modern organizations that involve individuals
intentionally or unintentionally engaging in behaviors that undermine or abuse information …
intentionally or unintentionally engaging in behaviors that undermine or abuse information …
Benchmark-based reference model for evaluating botnet detection tools driven by traffic-flow analytics
KS Huancayo Ramos, MA Sotelo Monge… - Sensors, 2020 - mdpi.com
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide
heterogeneity of endpoint devices at the Edge of the emerging communication environments …
heterogeneity of endpoint devices at the Edge of the emerging communication environments …