ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2204.03433
  4. Cited By
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under
  Advanced Persistent Threats
v1v2 (latest)

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

ACM Computing Surveys (ACM CSUR), 2022
7 April 2022
Zhiyan Chen
Jinxin Liu
Yuling Shen
Murat Simsek
B. Kantarci
Hussein T. Mouftah
P. Djukic
ArXiv (abs)PDFHTML

Papers citing "Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats"

12 / 12 papers shown
From One Attack Domain to Another: Contrastive Transfer Learning with Siamese Networks for APT Detection
From One Attack Domain to Another: Contrastive Transfer Learning with Siamese Networks for APT DetectionKnowledge-Based Systems (KBS), 2025
Sidahmed Benabderrahmane
Talal Rahwan
AAML
243
2
0
25 Nov 2025
Enhancing Adversarial Robustness of IoT Intrusion Detection via SHAP-Based Attribution Fingerprinting
Enhancing Adversarial Robustness of IoT Intrusion Detection via SHAP-Based Attribution Fingerprinting
Dilli Prasad Sharma
Liang Xue
Xiaowei Sun
Xiaodong Lin
Pulei Xiong
147
0
0
09 Nov 2025
Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and Opportunities
Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and Opportunities
Safayat Bin Hakim
M. Adil
Alvaro Velasquez
Shouhuai Xu
Houbing Herbert Song
AAMLNAI
177
3
0
08 Sep 2025
Blockchain-Enabled Privacy-Preserving Second-Order Federated Edge Learning in Personalized Healthcare
Blockchain-Enabled Privacy-Preserving Second-Order Federated Edge Learning in Personalized Healthcare
Anum Nawaz
Muhammad Irfan
Xianjia Yu
Zhuo Zou
Tomi Westerlund
Zhuo Zou
Tomi Westerlund
173
0
0
31 May 2025
Large Language Model-driven Security Assistant for Internet of Things via Chain-of-Thought
Large Language Model-driven Security Assistant for Internet of Things via Chain-of-ThoughtIEEE Internet of Things Journal (IEEE IoT J.), 2025
Mingfei Zeng
Ming Xie
Xixi Zheng
Chunhai Li
Chuan Zhang
Liehuang Zhu
286
9
0
08 May 2025
CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment
CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment
Erfan Ghiasvand
Suprio Ray
S. Iqbal
Sajjad Dadkhah
Ali A. Ghorbani
281
24
0
15 Jul 2024
Multidomain transformer-based deep learning for early detection of
  network intrusion
Multidomain transformer-based deep learning for early detection of network intrusionGlobal Communications Conference (GLOBECOM), 2023
Jinxin Liu
Murat Simsek
Michele Nogueira Lima
B. Kantarci
AI4TS
246
11
0
03 Sep 2023
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey
  of Vulnerabilities, Datasets, and Defenses
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and DefensesIEEE Communications Surveys and Tutorials (COMST), 2023
M. Ferrag
Othmane Friha
B. Kantarci
Norbert Tihanyi
Lucas C. Cordeiro
Merouane Debbah
Djallel Hamouda
Muna Al-Hawawreh
K. Choo
407
116
0
17 Jun 2023
Host-Based Network Intrusion Detection via Feature Flattening and
  Two-stage Collaborative Classifier
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier
Zhiyan Chen
Murat Simsek
B. Kantarci
Mehran Bagheri
P. Djukic
251
7
0
15 Jun 2023
Single-board Device Individual Authentication based on Hardware
  Performance and Autoencoder Transformer Models
Single-board Device Individual Authentication based on Hardware Performance and Autoencoder Transformer ModelsComputers & security (Comput. Secur.), 2023
Pedro Miguel Sánchez Sánchez
Alberto Huertas Celdrán
Gérome Bovet
Gregorio Martínez Pérez
327
7
0
14 Jun 2023
Prior Knowledge based Advanced Persistent Threats Detection for IoT in a
  Realistic Benchmark
Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic BenchmarkGlobal Communications Conference (GLOBECOM), 2022
Yuling Shen
Murat Simsek
B. Kantarci
Hussein T. Mouftah
Mehran Bagheri
P. Djukic
89
11
0
10 Aug 2022
A methodology to identify identical single-board computers based on
  hardware behavior fingerprinting
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
Pedro Miguel Sánchez Sánchez
José María Jorquera Valero
Alberto Huertas Celdrán
Gérome Bovet
M. Gil Pérez
Gregorio Martínez Pérez
382
17
0
15 Jun 2021
1
Page 1 of 1