Archives

Rec-Def: A Recommendation-based Defence Mechanism for Privacy Preservation in Federated Learning Systems

  • November 19, 2023
  • Comments off

An emergence of attention and regulations on consumer privacy can be observed over the recent years with the ubiquitous availability of IoT systems handling personal data. Federated Learning (FL) arises as a privacy-preserved Machine Learning (ML) technique where data can be kept private within these devices without transmitting to third parties. Yet, many privacy attacks […]

Read More

From Opacity to Clarity: Leveraging XAI for Robust Network Traffic Classification

  • November 19, 2023
  • Comments off

A wide adoption of Artificial Intelligence (AI) can be observed in recent years over networking to provide zero-touch, full autonomy of services towards the next generation Beyond 5G (B5G)/6G. However, AI-driven attacks on these services are a major concern in reaching the full potential of this future vision. Identifying how resilient the AI models are […]

Read More

FL-TIA: Novel Time Inference Attacks on Federated Learning

  • November 19, 2023
  • Comments off

Federated Learning (FL) is an emerging privacy-preserved distributed Machine Learning (ML) technique where multiple clients can contribute to training an ML model without sharing private data. Even though FL offers a certain level of privacy by design, recent works show that FL is vulnerable to numerous privacy attacks. One of the key features of FL […]

Read More

Privacy of the Metaverse: Current Issues, AI Attacks, and Possible Solutions

  • July 1, 2023
  • Comments off

Metaverse is a key emerging digital transformation concept for the next generation of cyberspace. It is expected to create a self-sustaining virtual ecosystem of fully immersive, real-time experiences with numerous opportunities for general users and industries to interact with the world. With the introduction of 6G networks and enabling technologies, the metaverse will achieve its […]

Read More
IoT_book_chapter

Introduction to IoT Security

  • September 5, 2019
  • Comments off

In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart everything, the Internet of Things (IoT) security plays a centric role with no margin for error or shortage on supply. Securing, including the authentication of these […]

Read More