Edge learning for 6G-enabled internet of things: A comprehensive survey of vulnerabilities, datasets, and defenses

MA Ferrag, O Friha, B Kantarci… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …

Data poisoning attacks in intelligent transportation systems: A survey

F Wang, X Wang, XJ Ban - Transportation Research Part C: Emerging …, 2024 - Elsevier
Emerging technologies drive the ongoing transformation of Intelligent Transportation
Systems (ITS). This transformation has given rise to cybersecurity concerns, among which …

Poisoning attacks and defenses on artificial intelligence: A survey

MA Ramirez, SK Kim, HA Hamadi, E Damiani… - arxiv preprint arxiv …, 2022 - arxiv.org
Machine learning models have been widely adopted in several fields. However, most recent
studies have shown several vulnerabilities from attacks with a potential to jeopardize the …

Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey

VT Hoang, YA Ergu, VL Nguyen, RG Chang - Journal of Network and …, 2024 - Elsevier
The advent of sixth-generation (6G) networks is expected to start a new era in mobile
networks, characterized by unprecedented high demands on dense connectivity, ultra …

Practical private aggregation in federated learning against inference attack

P Zhao, Z Cao, J Jiang, F Gao - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Federated learning (FL) enables multiple worker devices share local models trained on their
private data to collaboratively train a machine learning model. However, local models are …

Disguised as privacy: Data poisoning attacks against differentially private crowdsensing systems

Z Li, Z Zheng, S Guo, B Guo, F **ao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Although crowdsensing has emerged as a popular information collection paradigm, its
security and privacy vulnerabilities have come to the forefront in recent years. However, one …

An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles

S Gupta, C Maple, R Passerone - IEEE Access, 2023 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …

2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids

Y Chang, J Li, W Li - Journal of Information Security and Applications, 2023 - Elsevier
In smart grid services, electricity consumption data sharing may lead to privacy breaches
and the potential for misuse of personal data. Existing data aggregation approaches mainly …

Poison-resilient anomaly detection: Mitigating poisoning attacks in semi-supervised encrypted traffic anomaly detection

Z Wu, H Li, Y Qian, Y Hua, H Gan - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Semi-supervised encrypted traffic anomaly detection models in zero-positive scenarios are
susceptible to human labeling errors or poisoning attacks, thereby compromising the …

Adversarial Reinforcement Learning based Data Poisoning Attacks Defense for Task-Oriented Multi-User Semantic Communication

J Peng, H **ng, L Xu, S Luo, P Dai… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Multi-user semantic communication (MUSC) has emerged as a promising paradigm for
future 6G networks and applications, where massive clients (eg, mobile devices) …