标题
Security and Privacy in IoT Using Machine Learning and Blockchain
作者
关键词
-
出版物
ACM COMPUTING SURVEYS
Volume 53, Issue 6, Pages 1-37
出版商
Association for Computing Machinery (ACM)
发表日期
2020-12-07
DOI
10.1145/3417987
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Secure decentralized peer-to-peer training of deep neural networks based on distributed ledger technology
- (2020) Amin Fadaeddini et al. JOURNAL OF SUPERCOMPUTING
- A Blockchain-Powered Decentralized and Secure Computing Paradigm
- (2020) Gihan J. Mendis et al. IEEE Transactions on Emerging Topics in Computing
- Survey on blockchain for Internet of Things
- (2019) Xu Wang et al. COMPUTER COMMUNICATIONS
- Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition
- (2019) Gaurav Goswami et al. INTERNATIONAL JOURNAL OF COMPUTER VISION
- Privacy-Preserving Machine Learning: Threats and Solutions
- (2019) Mohammad Al-Rubaie et al. IEEE SECURITY & PRIVACY
- Internet of Things: A survey on machine learning-based intrusion detection approaches
- (2019) Kelton A.P. da Costa et al. Computer Networks
- Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
- (2019) Muneeb Ul Hassan et al. Future Generation Computer Systems-The International Journal of eScience
- Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities
- (2019) Meng Shen et al. IEEE Internet of Things Journal
- Internet of things security: A top-down survey
- (2018) Djamel Eddine Kouicem et al. Computer Networks
- On blockchain and its integration with IoT. Challenges and opportunities
- (2018) Ana Reyna et al. Future Generation Computer Systems-The International Journal of eScience
- Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing
- (2018) Abebe Abeshu et al. IEEE COMMUNICATIONS MAGAZINE
- Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM
- (2018) Vishal Sharma et al. IEEE COMMUNICATIONS MAGAZINE
- A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- (2018) Preeti Mishra et al. IEEE Communications Surveys and Tutorials
- Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
- (2018) Muhamad Erza Aminanto et al. IEEE Transactions on Information Forensics and Security
- CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
- (2018) Lun Li et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Preserving Model Privacy for Machine Learning in Distributed Systems
- (2018) Qi Jia et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks
- (2018) Lorenzo Fernandez Maimo et al. IEEE Access
- Malware Threats and Detection for Industrial Mobile-IoT Networks
- (2018) Shaila Sharmeen et al. IEEE Access
- GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid
- (2018) Jianbin Gao et al. IEEE Access
- A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT
- (2018) Pradip Kumar Sharma et al. IEEE Access
- A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
- (2018) Qiang Liu et al. IEEE Access
- A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications
- (2018) Jingzhong Wang et al. IEEE Access
- A Novel Dynamic Android Malware Detection System With Ensemble Learning
- (2018) Pengbin Feng et al. IEEE Access
- When Intrusion Detection Meets Blockchain Technology: A Review
- (2018) Weizhi Meng et al. IEEE Access
- Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications
- (2018) Abebe Diro et al. IEEE COMMUNICATIONS MAGAZINE
- Security Services Using Blockchains: A State of the Art Survey
- (2018) Tara Salman et al. IEEE Communications Surveys and Tutorials
- Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning
- (2018) Bo Feng et al. IEEE NETWORK
- IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?
- (2018) Liang Xiao et al. IEEE SIGNAL PROCESSING MAGAZINE
- Design of cognitive fog computing for intrusion detection in Internet of Things
- (2018) S. Prabavathy et al. JOURNAL OF COMMUNICATIONS AND NETWORKS
- Blockchain and IoT Integration: A Systematic Survey
- (2018) Alfonso Panarello et al. SENSORS
- An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
- (2018) Nour Moustafa et al. IEEE Internet of Things Journal
- IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain
- (2018) Bin Yu et al. IEEE Cloud Computing
- Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch
- (2018) Xuyang Jing et al. Information Fusion
- Privacy in the age of medical big data
- (2018) W. Nicholson Price et al. NATURE MEDICINE
- Blockchain-Based Secure Time Protection Scheme in IoT
- (2018) Kai Fan et al. IEEE Internet of Things Journal
- Physical-Layer Authentication Based on Extreme Learning Machine
- (2017) Ning Wang et al. IEEE COMMUNICATIONS LETTERS
- DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks
- (2017) Pradip Kumar Sharma et al. IEEE COMMUNICATIONS MAGAZINE
- Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains
- (2017) Jiawen Kang et al. IEEE Transactions on Industrial Informatics
- The environment needs cryptogovernance
- (2017) Guillaume Chapron NATURE
- Blockchain's roles in strengthening cybersecurity and protecting privacy
- (2017) Nir Kshetri TELECOMMUNICATIONS POLICY
- Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare
- (2017) Polina Mamoshina et al. Oncotarget
- Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM
- (2017) Hui Zhu et al. IEEE Journal of Biomedical and Health Informatics
- Machine Learning-Based Malicious Application Detection of Android
- (2017) Linfeng Wei et al. IEEE Access
- Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
- (2016) Mohammed A. Ambusaidi et al. IEEE TRANSACTIONS ON COMPUTERS
- Security and Privacy in Decentralized Energy Trading through Multi-signatures, Blockchain and Anonymous Messaging Streams
- (2016) Nurzhan Zhumabekuly Aitzhan et al. IEEE Transactions on Dependable and Secure Computing
- PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
- (2016) Liang Xiao et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Blockchain-based secure firmware update for embedded devices in an Internet of Things environment
- (2016) Boohyung Lee et al. JOURNAL OF SUPERCOMPUTING
- Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
- (2015) Zhiyuan Tan et al. IEEE TRANSACTIONS ON COMPUTERS
- Security of the Internet of Things: perspectives and challenges
- (2014) Qi Jing et al. WIRELESS NETWORKS
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now