Supported by the Fundamental Research Funds for the Central Universities(328202204)。
Federated Learning(FL),a burgeoning technology,has received increasing attention due to its privacy protection capability.However,the base algorithm FedAvg is vulnerable when it suffers from so-called backdoor attacks...
supported by the National Natural Science Foundation of China(61771154);the Fundamental Research Funds for the Central Universities(3072022CF0601);supported by Key Laboratory of Advanced Marine Communication and Information Technology,Ministry of Industry and Information Technology,Harbin Engineering University,Harbin,China.
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ...
supported in part by the“Pioneer”and“Leading Goose”R&D Program of Zhejiang(Grant No.2022C03174);the National Natural Science Foundation of China(No.92067103);the Key Research and Development Program of Shaanxi,China(No.2021ZDLGY06-02);the Natural Science Foundation of Shaanxi Province(No.2019ZDLGY12-02);the Shaanxi Innovation Team Project(No.2018TD-007);the Xi'an Science and technology Innovation Plan(No.201809168CX9JC10);the Fundamental Research Funds for the Central Universities(No.YJS2212)and National 111 Program of China B16037.
The security of Federated Learning(FL)/Distributed Machine Learning(DML)is gravely threatened by data poisoning attacks,which destroy the usability of the model by contaminating training samples,so such attacks are ca...
The work presented in this paper is supported by the Shandong Provincial Natural Science Foundation(No.ZR2020MF04);National Natural Science Foundation of China(No.62072469);the Fundamental Research Funds for the Central Universities(19CX05027B,19CX05003A-11);West Coast Artificial Intelligence Technology Innovation Center(2019-1-5,2019-1-6);the Opening Project of Shanghai Trusted Industrial Control Platform(TICPSH202003015-ZC).
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection attacks.Most DDoS attack defence strategies deploy only to a certain type of devices ...
In recent years,we have witnessed a surge in mobile devices such as smartphones,tablets,smart watches,etc.,most of which are based on the Android operating system.However,because these Android-based mobile devices are...
supported by the National Natural Science Foundation of China under Grant No.61966011.
While malicious samples are widely found in many application fields of machine learning,suitable countermeasures have been investigated in the field of adversarial machine learning.Due to the importance and popularity...
This work was supported in part by the National Natural Science Foundation of China under Grants 62002104 and 61872416;the Natural Science Foundation of Hubei Province of China under Grant 2019CFB191;the special fund for Wuhan Yellow Crane Talents(Excellent Young Scholar).
Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life.However,using machine learning in intelligent network...
Due to the increasing cyber-attacks,various Intrusion Detection Systems(IDSs)have been proposed to identify network anomalies.Most existing machine learning-based IDSs learn patterns from the features extracted from n...
Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity,which opens up new possibilities for different cyber-attacks,including in-vehicle attacks(e.g.,hijacking attacks)a...
Massive Multiple Input Multiple Output(MIMO)has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.This paper derives a closedform a...