2021
DOI: 10.1109/jiot.2020.3003802
|View full text |Cite
|
Sign up to set email alerts
|

Robust Spammer Detection Using Collaborative Neural Network in Internet-of-Things Applications

Abstract: Spamming is emerging as a key threat to Internet of Things (IoT)-based social media applications. It will pose serious security threats to the IoT cyberspace. To this end, artificial intelligence-based detection and identification techniques have been widely investigated. The literature works on IoT cyberspace can be categorized into two categories: 1) behavior pattern-based approaches; and 2) semantic pattern-based approaches. However, they are unable to effectively handle concealed, complicated, and changing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 134 publications
(62 citation statements)
references
References 34 publications
0
62
0
Order By: Relevance
“…During the recent years, deep learning based methods have made remarkable progress in many fileds [24], such as Internet of Things [25,26], Signal processing [27,28], UAV [29], wireless communications [30], and especially in the field of agriculture [31][32][33][34][35]. These include fruit classification [36][37][38], yield estimation and counting [39,40].…”
Section: Deep Learning Based Methodsmentioning
confidence: 99%
“…During the recent years, deep learning based methods have made remarkable progress in many fileds [24], such as Internet of Things [25,26], Signal processing [27,28], UAV [29], wireless communications [30], and especially in the field of agriculture [31][32][33][34][35]. These include fruit classification [36][37][38], yield estimation and counting [39,40].…”
Section: Deep Learning Based Methodsmentioning
confidence: 99%
“…Also, it is not suffering from certificate management issue, key escrow issue, public key replacement issue, and secure channel need problem. The new scheme ensured the security requirements, i.e., Warrant Unforgeability, Confidentiality, Integrity, Unforgeability, Forward Secrecy, and Resists Replay Attack [41,42,43,44], respectively. Our scheme is not affected by heavy computation because we used hyper elliptic curve instead of bilinear pairing and elliptic curve which need very miner time for computations [11,12].…”
Section: Ming Et Al [2014]mentioning
confidence: 97%
“…The perception layer is mainly responsible for perception and data collection. It senses and monitors surrounding things and events through sensor collection nodes and obtains corresponding data [36][37][38]. It lies at the bottom of the three-tier system architecture of the Internet of Things.…”
Section: A Iot System Architecturementioning
confidence: 99%