2022
DOI: 10.1016/j.compeleceng.2022.108048
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The IoT security management platform [ 17 ] plays a pivotal role in ensuring the security of IoT applications. It facilitates comprehensive management, monitoring, and control of IoT applications, offering unified security management for IoT devices and systems.…”
Section: Related Workmentioning
confidence: 99%
“…The IoT security management platform [ 17 ] plays a pivotal role in ensuring the security of IoT applications. It facilitates comprehensive management, monitoring, and control of IoT applications, offering unified security management for IoT devices and systems.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [12] discussed the use of machine learning in network security research in their paper, pointing out that while we use machine learning to maintain network security, attackers are attempting to use machine learning to launch network attacks. Therefore, the development of new network security technologies is imminent.…”
Section: Related Workmentioning
confidence: 99%
“…Data security [12] Machine Learning Machine Learning Platform [13] RBF neural network Radial Basis Function neural network sliding mode controller [14] Fast R-CNN Multi-strategy region proposal network algorithm [15] Data fusion approaches Data collection framework Asymmetric network [16] Blockchain-as-a-Service multi-preference matching [17] Deep reinforcement learning Cloud-edge cooperative content-delivery strategy [18] Mobile edge computing Task offloading and fault tolerance algorithm traditional consensus algorithms [19] PoW [20] PoS [21] DPoS consensus algorithms in IoV [23] PoW,PoS Decentralized trust management system [24] PoW,PBFT Blockchain-based TM with conditional privacy-preserving scheme [25] DPoS Soft security solution [26] PBFT,EigenTrust T-PBFT…”
Section: Literature Basic Algorithm Innovationmentioning
confidence: 99%
“…CNN has made greater accomplishments in image recognition and classification [6]. The popularity and accuracy of CNN for image classification have been optimized due to the largescale system for learning and image processing, higher-speed GPUs, and the huge availability of public datasets of an image [7]. The idea of smart waste classification with waste and trash images has tremendous potential.…”
Section: Introductionmentioning
confidence: 99%