2022 32nd Conference of Open Innovations Association (FRUCT) 2022
DOI: 10.23919/fruct56874.2022.9953823
|View full text |Cite
|
Sign up to set email alerts
|

Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 50 publications
0
0
0
Order By: Relevance
“…After the big growth in IoT applications and devices and after being surrounded by varies vulnerabilities, it becomes harder to secure those systems with humans, ML techniques play an important role in regular and IoT networks security. Considering the various vulnerabilities in the IoT domain, ML algorithms are widely being used to tackle the potential Issues [226]. The requirements for securing IoT devices have become complex because several technologies, from physical devices and wireless transmission to mobile and cloud architectures, need to be secured and combined with other technologies.…”
Section: And DL In Iot Securitymentioning
confidence: 99%
“…After the big growth in IoT applications and devices and after being surrounded by varies vulnerabilities, it becomes harder to secure those systems with humans, ML techniques play an important role in regular and IoT networks security. Considering the various vulnerabilities in the IoT domain, ML algorithms are widely being used to tackle the potential Issues [226]. The requirements for securing IoT devices have become complex because several technologies, from physical devices and wireless transmission to mobile and cloud architectures, need to be secured and combined with other technologies.…”
Section: And DL In Iot Securitymentioning
confidence: 99%