Machine learning and blockchain technologies for cybersecurity in connected vehicles

J Ahmad, MU Zia, IH Naqvi, JN Chattha… - … reviews: data mining …, 2024 - Wiley Online Library
Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …

Machine learning in cybersecurity: a comprehensive survey

D Dasgupta, Z Akhtar, S Sen - The Journal of Defense …, 2022 - journals.sagepub.com
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …

The roadmap to 6G security and privacy

P Porambage, G Gür, DPM Osorio… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …

Improving the reliability of deep neural networks in NLP: A review

B Alshemali, J Kalita - Knowledge-Based Systems, 2020 - Elsevier
Deep learning models have achieved great success in solving a variety of natural language
processing (NLP) problems. An ever-growing body of research, however, illustrates the …

Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023 - Elsevier
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …

Deep reinforcement adversarial learning against botnet evasion attacks

G Apruzzese, M Andreolini, M Marchetti… - … on Network and …, 2020 - ieeexplore.ieee.org
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to
these defenses escalate as well. Supervised classifiers are prone to adversarial evasion …

Adversarial attacks and defenses on cyber–physical systems: A survey

J Li, Y Liu, T Chen, Z **ao, Z Li… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Cyber-security issues on adversarial attacks are actively studied in the field of computer
vision with the camera as the main sensor source to obtain the input image or video data …

Variable binding for sparse distributed representations: Theory and applications

EP Frady, D Kleyko, FT Sommer - IEEE Transactions on Neural …, 2021 - ieeexplore.ieee.org
Variable binding is a cornerstone of symbolic reasoning and cognition. But how binding can
be implemented in connectionist models has puzzled neuroscientists, cognitive …

On the use of artificial malicious patterns for android malware detection

M Jerbi, ZC Dagdia, S Bechikh, LB Said - Computers & Security, 2020 - Elsevier
Malware programs currently represent the most serious threat to computer information
systems. Despite the performed efforts of researchers in this field, detection tools still have …

Towards robust person re-identification by defending against universal attackers

F Yang, J Weng, Z Zhong, H Liu, Z Wang… - … on Pattern Analysis …, 2022 - ieeexplore.ieee.org
Recent studies show that deep person re-identification (re-ID) models are vulnerable to
adversarial examples, so it is critical to improving the robustness of re-ID models against …