Privacy-preserving in Blockchain-based Federated Learning systems

KM Sameera, S Nicolazzo, M Arazzi, A Nocera… - Computer …, 2024 - Elsevier
Federated Learning (FL) has recently arisen as a revolutionary approach to collaborative
training Machine Learning models. According to this novel framework, multiple participants …

Anomaly detection in blockchain networks using unsupervised learning: A survey

C Cholevas, E Angeli, Z Sereti, E Mavrikos… - Algorithms, 2024 - mdpi.com
In decentralized systems, the quest for heightened security and integrity within blockchain
networks becomes an issue. This survey investigates anomaly detection techniques in …

Privacy-Preserving Network Traffic Analysis Using Homomorphic Encryption

SEVS Pillai, K Polimetla - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
Privacy and Homomorphic Encryption are effective ways for securely evaluating network
records by encrypting them with a sophisticated cryptographic algorithm. This method …

A defense mechanism against label inference attacks in vertical federated learning

M Arazzi, S Nicolazzo, A Nocera - Neurocomputing, 2025 - Elsevier
Abstract Vertical Federated Learning (VFL, for short) is a category of Federated Learning
that is gaining increasing attention in the context of Artificial Intelligence. According to this …

A deep reinforcement learning approach for security-aware service acquisition in IoT

M Arazzi, S Nicolazzo, A Nocera - Journal of Information Security and …, 2024 - Elsevier
Abstract The emerging Internet of Things (IoT) landscape is characterized by a high number
of heterogeneous smart devices and services often provided by third parties. Although …

The semioe ontology: A semantic model solution for an ioe-based industry

M Arazzi, A Nocera, E Storti - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Recently, the Industry 5.0 is gaining attention as a novel paradigm, defining the next
concrete steps toward more and more intelligent, green-aware, and user-centric digital …

Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey

A Vyas, PC Lin, RH Hwang, M Tripathi - IEEE Access, 2024 - ieeexplore.ieee.org
With the rapid development of artificial intelligence and a new generation of network
technologies, the Internet of Things (IoT) is expanding worldwide. Malicious agents …

A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023

S Kumari, C Prabha, A Karim… - IET Information …, 2024 - Wiley Online Library
Almost 85% of companies polled said they were looking into anomaly detection (AD)
technologies for their industrial image anomalies. The present problem concerns detecting …

[HTML][HTML] SeCTIS: A framework to Secure CTI Sharing

DR Arikkat, M Cihangiroglu, M Conti, RR KA… - Future Generation …, 2025 - Elsevier
The rise of IT-dependent operations in modern organizations has heightened their
vulnerability to cyberattacks. Organizations are inadvertently enlarging their vulnerability to …

Privacy Preserving Anomaly Detection on Homomorphic Encrypted Data from IoT Sensors

A Hangan, D Lazea, T Cioara - arxiv preprint arxiv:2403.09322, 2024 - arxiv.org
IoT devices have become indispensable components of our lives, and the advancement of
AI technologies will make them even more pervasive, increasing the vulnerability to …