|
|
|
Maoli Wang, Yu Sun, Hongtao Sun and Bowen Zhang
The Industrial Internet of Things (IIoT), where numerous smart devices associated with sensors, actuators, computers, and people communicate with shared networks, has gained advantages in many fields, such as smart manufacturing, intelligent transportati...
ver más
|
|
|
|
|
|
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu...
ver más
|
|
|
|
|
|
Yongli Tang, Deng Pan, Panke Qin and Liping Lv
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde...
ver más
|
|
|
|
|
|
Jawhara Boodai, Aminah Alqahtani and Mounir Frikha
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate and connect to the internet. However, as with any new technology, 5G networks also bring new security challenges that need to be addressed. One of the key areas of co...
ver más
|
|
|
|
|
|
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate...
ver más
|
|
|