Advancements in securing federated learning with IDS: a comprehensive review of neural networks and feature engineering techniques for malicious client detection

N Latif, W Ma, HB Ahmad - Artificial Intelligence Review, 2025 - Springer
Federated Learning (FL) is a technique that can learn a global machine-learning model at a
central server by aggregating locally trained models. This distributed machine-learning …

Exploring Machine learning algorithms for Malicious node detection using cluster based trust entropy

S Kanthimathi - IEEE Access, 2024 - ieeexplore.ieee.org
Machine learning has, over the decades, ushered in a dramatic transformation across a
range of sectors, including network security. Security experts agree that the potential of …

PETIT: PUF-enabled trust evaluation framework for IoT networks

SS Mehjabin, M Younis, A Tekeoglu, M Ebrahimabadi… - Computer Networks, 2024 - Elsevier
Abstract Internet-of-Things (IoT) is characterized by the incorporation of resource
constrained devices that are inter-networked in an ad-hoc manner. Given the diversity of the …

Defenses Against Artificial Intelligence Attacks

M Tsikerdekis, S Zeadally, I Katib - Computer, 2024 - ieeexplore.ieee.org
The integration of artificial intelligence has led to significant advancements across industries
but also exposed systems to security vulnerabilities. We evaluate defense methods …

FEDQ-Trust: Efficient Data-Driven Trust Prediction for Mobile Edge-Based IoT Systems

J Bai, H Dong, A Bouguettaya - arxiv preprint arxiv:2404.18356, 2024 - arxiv.org
We introduce FEDQ-Trust, an innovative data-driven trust prediction approach designed for
mobile edge-based Internet of Things (IoT) environments. The decentralized nature of …

Evaluation and Classification of Kidney Stone Detection Using Deep Learning Techniques

M Nadeem, G Tan, M Altaf, MK Mumtaz… - 2023 6th International …, 2023 - ieeexplore.ieee.org
Kidney stone detection is a crucial task in medical diagnostics where early identification can
mitigate severe health complications. This research employs advanced deep-learning …

Lightweight Cryptography Based Secured Data Transmission Model for Quality of Service in Internet of Things-A Comparative Analysis.

S Puli, N Srinivasu - International Journal of Safety & Security …, 2024 - search.ebscohost.com
Emerging technology like Internet of Things (IoT) seeks to facilitate the linking of numerous
smart devices and diverse networks. IoT enabled platform architecture heavily relies on ad …

Innovation and Emerging Trends in Computing and Information Technologies: First International Conference, IETCIT 2024, Mohali, Punjab, India, March 1–2, 2024 …

M Malhotra - 2024 - books.google.com
The rapid pace of technological evolution has transformed the way we live, work, and
interact with each other. Computing and information technology play a pivotal role in driving …

A Study on Malicious Node Detection in Different Application Domains

B Jayaram, T Sethukarasi… - … Conference on Research …, 2023 - ieeexplore.ieee.org
Nowadays security and privacy in online networks is always questionable due to various
factors in terms of cyber security in the form of attackers present outside the network. In this …

Enhancing IoT Security Through Hierarchical Message-Passing Graph Neural Networks: A Trust-Driven Strategy for Identifying Malicious Nodes

C Senthil Kumar, R Vijay Anand - … on Innovation and Emerging Trends in …, 2024 - Springer
Abstract Internet of Things (IoT) gadgets connect and simplify life in several ways. The
independence of these technologies poses some issues, such as the protection of security …