Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Edge learning for 6G-enabled internet of things: A comprehensive survey of vulnerabilities, datasets, and defenses
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
Data poisoning attacks in intelligent transportation systems: A survey
Emerging technologies drive the ongoing transformation of Intelligent Transportation
Systems (ITS). This transformation has given rise to cybersecurity concerns, among which …
Systems (ITS). This transformation has given rise to cybersecurity concerns, among which …
Poisoning attacks and defenses on artificial intelligence: A survey
Machine learning models have been widely adopted in several fields. However, most recent
studies have shown several vulnerabilities from attacks with a potential to jeopardize the …
studies have shown several vulnerabilities from attacks with a potential to jeopardize the …
Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey
The advent of sixth-generation (6G) networks is expected to start a new era in mobile
networks, characterized by unprecedented high demands on dense connectivity, ultra …
networks, characterized by unprecedented high demands on dense connectivity, ultra …
Practical private aggregation in federated learning against inference attack
P Zhao, Z Cao, J Jiang, F Gao - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Federated learning (FL) enables multiple worker devices share local models trained on their
private data to collaboratively train a machine learning model. However, local models are …
private data to collaboratively train a machine learning model. However, local models are …
Disguised as privacy: Data poisoning attacks against differentially private crowdsensing systems
Although crowdsensing has emerged as a popular information collection paradigm, its
security and privacy vulnerabilities have come to the forefront in recent years. However, one …
security and privacy vulnerabilities have come to the forefront in recent years. However, one …
An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …
transportation on a global scale. Such innovations for transportation can bring manyfold …
2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids
Y Chang, J Li, W Li - Journal of Information Security and Applications, 2023 - Elsevier
In smart grid services, electricity consumption data sharing may lead to privacy breaches
and the potential for misuse of personal data. Existing data aggregation approaches mainly …
and the potential for misuse of personal data. Existing data aggregation approaches mainly …
Poison-resilient anomaly detection: Mitigating poisoning attacks in semi-supervised encrypted traffic anomaly detection
Z Wu, H Li, Y Qian, Y Hua, H Gan - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Semi-supervised encrypted traffic anomaly detection models in zero-positive scenarios are
susceptible to human labeling errors or poisoning attacks, thereby compromising the …
susceptible to human labeling errors or poisoning attacks, thereby compromising the …
Adversarial Reinforcement Learning based Data Poisoning Attacks Defense for Task-Oriented Multi-User Semantic Communication
Multi-user semantic communication (MUSC) has emerged as a promising paradigm for
future 6G networks and applications, where massive clients (eg, mobile devices) …
future 6G networks and applications, where massive clients (eg, mobile devices) …