AI and 6G security: Opportunities and challenges

Y Siriwardhana, P Porambage… - 2021 Joint European …, 2021 - ieeexplore.ieee.org
While 5G is well-known for network cloudification with micro-service based architecture, the
next generation networks or the 6G era is closely coupled with intelligent network …

Adversarial attacks and defenses in deep learning: From a perspective of cybersecurity

S Zhou, C Liu, D Ye, T Zhu, W Zhou, PS Yu - ACM Computing Surveys, 2022 - dl.acm.org
The outstanding performance of deep neural networks has promoted deep learning
applications in a broad set of domains. However, the potential risks caused by adversarial …

[HTML][HTML] Security and privacy in 6G networks: New areas and new challenges

M Wang, T Zhu, T Zhang, J Zhang, S Yu… - Digital Communications …, 2020 - Elsevier
With the deployment of more and more 5g networks, the limitations of 5g networks have
been found, which undoubtedly promotes the exploratory research of 6G networks as the …

Differential privacy for industrial internet of things: Opportunities, applications, and challenges

B Jiang, J Li, G Yue, H Song - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The development of Internet of Things (IoT) brings new changes to various fields.
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …

A hybrid Harris Hawks optimization algorithm with simulated annealing for feature selection

M Abdel-Basset, W Ding, D El-Shahat - Artificial Intelligence Review, 2021 - Springer
The significant growth of modern technology and smart systems has left a massive
production of big data. Not only are the dimensional problems that face the big data, but …

Measurement and prediction of work engagement under different indoor lighting conditions using physiological sensing

M Deng, X Wang, CC Menassa - Building and Environment, 2021 - Elsevier
Employee productivity is of paramount importance to most organizations. Studies have
shown that a suitable indoor lighting condition is key to help employees remain productive …

Multi-feature fusion approach for epileptic seizure detection from EEG signals

M Radman, M Moradi, A Chaibakhsh… - IEEE sensors …, 2020 - ieeexplore.ieee.org
In this article, a new fusion scheme based on the Dempster-Shafer Evidence Theory (DSET)
is introduced for Epileptic Seizure Detection (ESD) in brain disorders. Firstly, various …

The dynamic privacy-preserving mechanisms for online dynamic social networks

T Zhu, J Li, X Hu, P **ong… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Networks that constantly transmit information and change structure are becoming
increasingly prevalent. However, traditional privacy models are designed to protect static …

[HTML][HTML] Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions

A Yao, G Li, X Li, F Jiang, J Xu, X Liu - Array, 2023 - Elsevier
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …

Toward trustworthy and privacy-preserving federated deep learning service framework for industrial internet of things

N Bugshan, I Khalil, MS Rahman… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In this article, we propose a trustworthy privacy-preserving federated learning (FL)-based
deep learning (DL) service framework for Industrial Internet of Things-enabled systems. FL …