Skip to Content

189 Results Found

  • Article
  • Open Access
716 Views
24 Pages

Federated learning has gained popularity in recent years to enhance IoT security because the model allows decentralized devices to collaboratively learn a shared model without exchanging raw data. Despite its privacy advantages, federated learning is...

  • Article
  • Open Access
8 Citations
5,690 Views
45 Pages

An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks

  • Majed Altoub,
  • Fahad AlQurashi,
  • Tan Yigitcanlar,
  • Juan M. Corchado and
  • Rashid Mehmood

31 October 2022

Deep neural networks (DNNs) have successfully delivered cutting-edge performance in several fields. With the broader deployment of DNN models on critical applications, the security of DNNs has become an active and yet nascent area. Attacks against DN...

  • Article
  • Open Access
7 Citations
2,919 Views
19 Pages

Impacting Robustness in Deep Learning-Based NIDS through Poisoning Attacks

  • Shahad Alahmed,
  • Qutaiba Alasad,
  • Jiann-Shiun Yuan and
  • Mohammed Alawad

11 April 2024

The rapid expansion and pervasive reach of the internet in recent years have raised concerns about evolving and adaptable online threats, particularly with the extensive integration of Machine Learning (ML) systems into our daily routines. These syst...

  • Article
  • Open Access
3 Citations
3,072 Views
19 Pages

Federated learning (FL) enables collaborative model building among a large number of participants without sharing sensitive data to the central server. Because of its distributed nature, FL has limited control over local data and the corresponding tr...

  • Article
  • Open Access
4 Citations
3,217 Views
18 Pages

1 August 2022

In recent years, human–computer interactions have begun to apply deep neural networks (DNNs), known as deep learning, to make them work more friendly. Nowadays, adversarial example attacks, poisoning attacks, and backdoor attacks are the typica...

  • Article
  • Open Access
2 Citations
2,905 Views
24 Pages

A Novel Data Sanitization Method Based on Dynamic Dataset Partition and Inspection Against Data Poisoning Attacks

  • Jaehyun Lee,
  • Youngho Cho,
  • Ryungeon Lee,
  • Simon Yuk,
  • Jaepil Youn,
  • Hansol Park and
  • Dongkyoo Shin

Deep learning (DL) technology has shown outstanding performance in various fields such as object recognition and classification, speech recognition, and natural language processing. However, it is well known that DL models are vulnerable to data pois...

  • Article
  • Open Access
5 Citations
3,711 Views
25 Pages

17 June 2023

The outstanding performance of deep neural networks (DNNs) in multiple computer vision in recent years has promoted its widespread use in aerial image semantic segmentation. Nonetheless, prior research has demonstrated the high susceptibility of DNNs...

  • Article
  • Open Access
4 Citations
1,327 Views
27 Pages

Anomaly-based attack detection methods depend on some form of machine learning to detect data falsification attacks in smart living cyber–physical systems. However, there is a lack of studies that consider the presence of attacks during the tra...

  • Article
  • Open Access
6 Citations
2,993 Views
13 Pages

Obtaining the balance between information loss and training accuracy is crucial in federated learning. Nevertheless, inadequate data quality will affect training accuracy. Here, to improve the training accuracy without affecting information loss, we...

  • Article
  • Open Access
10 Citations
5,464 Views
22 Pages

Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks

  • Usman Javed Butt,
  • Osama Hussien,
  • Krison Hasanaj,
  • Khaled Shaalan,
  • Bilal Hassan and
  • Haider al-Khateeb

29 November 2023

As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks. One way to ensure network security is by...

  • Article
  • Open Access
1,464 Views
19 Pages

Federated Learning (FL) systems are increasingly vulnerable to data poisoning attacks, in which malicious clients attempt to manipulate their training data in order to compromise the corresponding machine learning model. Existing detection techniques...

  • Article
  • Open Access
4 Citations
5,349 Views
42 Pages

Federated Learning: A Comparative Study of Defenses Against Poisoning Attacks

  • Inês Carvalho,
  • Kenton Huff,
  • Le Gruenwald and
  • Jorge Bernardino

19 November 2024

Federated learning is a new paradigm where multiple data owners, referred to as clients, work together with a global server to train a shared machine learning model without disclosing their personal training data. Despite its many advantages, the sys...

  • Article
  • Open Access
3 Citations
5,644 Views
18 Pages

3 October 2024

In this paper, we introduce a security approach for on-device learning Edge AIs designed to detect abnormal conditions in factory machines. Since Edge AIs are easily accessible by an attacker physically, there are security risks due to physical attac...

  • Article
  • Open Access
9,115 Views
16 Pages

27 September 2024

Deep Generative Models (DGMs), as a state-of-the-art technology in the field of artificial intelligence, find extensive applications across various domains. However, their security concerns have increasingly gained prominence, particularly with regar...

  • Article
  • Open Access
762 Views
26 Pages

14 October 2025

Artificial intelligence (AI) and machine learning (ML) have become integral to various applications, leveraging vast amounts of heterogeneous, globally distributed Internet of Things (IoT) data to identify patterns and build accurate ML models for pr...

  • Article
  • Open Access
453 Views
23 Pages

14 February 2026

This paper presents a framework that integrates blockchain-enabled Federated Learning (FL) with consensus mechanisms to mitigate poisoning attacks in healthcare environments. The framework incorporates blockchain consensus mechanisms, with Proof-of-W...

  • Article
  • Open Access
2 Citations
1,667 Views
24 Pages

28 July 2025

The integration of unmanned aerial vehicles (UAVs) into next-generation wireless networks greatly enhances the flexibility and efficiency of communication and distributed computation for ground mobile devices. Federated learning (FL) provides a priva...

  • Review
  • Open Access
22 Citations
15,223 Views
26 Pages

28 September 2019

Address Resolution Protocol (ARP) is a widely used protocol that provides a mapping of Internet Protocol (IP) addresses to Media Access Control (MAC) addresses in local area networks. This protocol suffers from many spoofing attacks because of its st...

  • Article
  • Open Access
556 Views
31 Pages

22 December 2025

Intensive Care Units (ICUs) face unprecedented challenges in resource allocation, particularly during health crises in which algorithmic systems may be exposed to adversarial manipulation. A transformer-based expert system, ICU-Transformer, is presen...

  • Article
  • Open Access
588 Views
34 Pages

18 November 2025

Graph-based Recommender Systems (GRSs) model complex user–item relationships. They offer improved accuracy and personalization in recommendations compared to traditional models. However, GRSs also face severe challenges from novel poisoning att...

  • Article
  • Open Access
152 Citations
14,207 Views
14 Pages

Deep Model Poisoning Attack on Federated Learning

  • Xingchen Zhou,
  • Ming Xu,
  • Yiming Wu and
  • Ning Zheng

Federated learning is a novel distributed learning framework, which enables thousands of participants to collaboratively construct a deep learning model. In order to protect confidentiality of the training data, the shared information between server...

  • Article
  • Open Access
14 Citations
4,600 Views
13 Pages

Selective Poisoning Attack on Deep Neural Networks

  • Hyun Kwon,
  • Hyunsoo Yoon and
  • Ki-Woong Park

8 July 2019

Studies related to pattern recognition and visualization using computer technology have been introduced. In particular, deep neural networks (DNNs) provide good performance for image, speech, and pattern recognition. However, a poisoning attack is a...

  • Article
  • Open Access
5 Citations
4,504 Views
14 Pages

Artificial intelligence (AI) will play an important role in realizing maritime autonomous surface ships (MASSs). However, as a double-edged sword, this new technology brings forth new threats. The purpose of this study is to raise awareness among sta...

  • Feature Paper
  • Article
  • Open Access
2 Citations
2,145 Views
19 Pages

1 February 2024

Various studies have been conducted on Multi-Agent Reinforcement Learning (MARL) to control multiple agents to drive effectively and safely in a simulation, demonstrating the applicability of MARL in autonomous driving. However, several studies have...

  • Article
  • Open Access
9 Citations
3,198 Views
17 Pages

28 June 2021

Accurate building energy prediction is useful in various applications starting from building energy automation and management to optimal storage control. However, vulnerabilities should be considered when designing building energy prediction models,...

  • Article
  • Open Access
3 Citations
3,032 Views
38 Pages

A Verifiable, Privacy-Preserving, and Poisoning Attack-Resilient Federated Learning Framework

  • Washington Enyinna Mbonu,
  • Carsten Maple,
  • Gregory Epiphaniou and
  • Christo Panchev

Federated learning is the on-device, collaborative training of a global model that can be utilized to support the privacy preservation of participants’ local data. In federated learning, there are challenges to model training regarding privacy...

  • Article
  • Open Access
1 Citations
1,600 Views
26 Pages

13 May 2025

Collaborative filtering, as a widely used recommendation method, is widely applied but susceptible to data poisoning attacks, where malicious actors inject synthetic user interaction data to manipulate recommendation results and secure illicit benefi...

  • Article
  • Open Access
2,268 Views
15 Pages

11 December 2024

Neural machine translation (NMT) systems have achieved outstanding performance and have been widely deployed in the real world. However, the undertranslation problem caused by the distribution of high-translation-entropy words in source sentences sti...

  • Article
  • Open Access
12 Citations
4,067 Views
20 Pages

Research on Data Poisoning Attack against Smart Grid Cyber–Physical System Based on Edge Computing

  • Yanxu Zhu,
  • Hong Wen,
  • Runhui Zhao,
  • Yixin Jiang,
  • Qiang Liu and
  • Peng Zhang

5 May 2023

Data poisoning attack is a well-known attack against machine learning models, where malicious attackers contaminate the training data to manipulate critical models and predictive outcomes by masquerading as terminal devices. As this type of attack ca...

  • Article
  • Open Access
3 Citations
2,382 Views
16 Pages

TPoison: Data-Poisoning Attack against GNN-Based Social Trust Model

  • Jiahui Zhao,
  • Nan Jiang,
  • Kanglu Pei,
  • Jie Wen,
  • Hualin Zhan and
  • Ziang Tu

11 June 2024

In online social networks, users can vote on different trust levels for each other to indicate how much they trust their friends. Researchers have improved their ability to predict social trust relationships through a variety of methods, one of which...

  • Article
  • Open Access
212 Views
19 Pages

9 March 2026

Hypergraph Neural Networks (HGNNs) have become an important tool for processing complex structured data due to their ability to model higher-order associative relationships. However, the inherent adversarial vulnerabilities of HGNNs may raise serious...

  • Article
  • Open Access
7 Citations
4,463 Views
13 Pages

A Sampling-Based Method for Detecting Data Poisoning Attacks in Recommendation Systems

  • Mohan Li,
  • Yuxin Lian,
  • Jinpeng Zhu,
  • Jingyi Lin,
  • Jiawen Wan and
  • Yanbin Sun

12 January 2024

The recommendation algorithm based on collaborative filtering is vulnerable to data poisoning attacks, wherein attackers can manipulate system output by injecting a large volume of fake rating data. To address this issue, it is essential to investiga...

  • Article
  • Open Access
3 Citations
2,346 Views
19 Pages

5 January 2024

Machine learning-based classification algorithms allow communication and computing (2C) task offloading from the end devices to the edge computing network servers. In this paper, we consider task classification based on the hybrid k-means and k&prime...

  • Article
  • Open Access
4 Citations
2,490 Views
24 Pages

The rapid integration of large-scale AI models into distributed systems, such as the Artificial Intelligence of Things (AIoT), has introduced critical security and privacy challenges. While configurable models enhance resource efficiency, their deplo...

  • Article
  • Open Access
19 Citations
2,681 Views
18 Pages

A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking

  • Arif Hussain Magsi,
  • Leanna Vidya Yovita,
  • Ali Ghulam,
  • Ghulam Muhammad and
  • Zulfiqar Ali

12 July 2023

Named data networking (NDN) is gaining momentum in vehicular ad hoc networks (VANETs) thanks to its robust network architecture. However, vehicular NDN (VNDN) faces numerous challenges, including security, privacy, routing, and caching. Specifically,...

  • Article
  • Open Access
15 Citations
6,263 Views
17 Pages

GAN-Driven Data Poisoning Attacks and Their Mitigation in Federated Learning Systems

  • Konstantinos Psychogyios,
  • Terpsichori-Helen Velivassaki,
  • Stavroula Bourou,
  • Artemis Voulkidis,
  • Dimitrios Skias and
  • Theodore Zahariadis

Federated learning (FL) is an emerging machine learning technique where machine learning models are trained in a decentralized manner. The main advantage of this approach is the data privacy it provides because the data are not processed in a central...

  • Article
  • Open Access
740 Views
21 Pages

22 December 2025

Machine learning (ML) has become a cornerstone of critical applications, but its vulnerability to data poisoning attacks threatens system reliability and trustworthiness. Prior studies have begun to investigate the impact of data poisoning and propos...

  • Article
  • Open Access
72 Citations
7,967 Views
17 Pages

10 August 2020

With the increasing popularity of the Internet of Things (IoT) platforms, the cyber security of these platforms is a highly active area of research. One key technology underpinning smart IoT systems is machine learning, which classifies and predicts...

  • Article
  • Open Access
4 Citations
1,970 Views
19 Pages

22 July 2024

Local differential privacy (LDP) protects user information from potential threats by randomizing data on individual devices before transmission to untrusted collectors. This method enables collectors to derive user statistics by analyzing randomized...

  • Article
  • Open Access
10 Citations
6,264 Views
22 Pages

30 October 2023

In response to the susceptibility of federated learning, which is based on a distributed training structure, to byzantine poisoning attacks from malicious clients, resulting in issues such as slowed or disrupted model convergence and reduced model ac...

  • Article
  • Open Access
2 Citations
7,539 Views
16 Pages

Torrent Poisoning Protection with a Reverse Proxy Server

  • António Godinho,
  • José Rosado,
  • Filipe Sá,
  • Filipe Caldeira and
  • Filipe Cardoso

30 December 2022

A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The pa...

  • Article
  • Open Access
8 Citations
6,850 Views
36 Pages

18 March 2025

Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training. While FL offers privacy benefits through local training, p...

  • Article
  • Open Access
22 Citations
4,210 Views
17 Pages

17 January 2022

As promising privacy-preserving machine learning technology, federated learning enables multiple clients to train the joint global model via sharing model parameters. However, inefficiency and vulnerability to poisoning attacks significantly reduce f...

  • Article
  • Open Access
4 Citations
4,094 Views
18 Pages

FLGQM: Robust Federated Learning Based on Geometric and Qualitative Metrics

  • Shangdong Liu,
  • Xi Xu,
  • Musen Wang,
  • Fei Wu,
  • Yimu Ji,
  • Chenxi Zhu and
  • Qurui Zhang

30 December 2023

Federated learning is a distributed learning method that seeks to train a shared global model by aggregating contributions from multiple clients. This method ensures that each client’s local data are not shared with others. However, research ha...

  • Article
  • Open Access
3 Citations
2,191 Views
17 Pages

An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning

  • Wenbin Yao,
  • Bangli Pan,
  • Yingying Hou,
  • Xiaoyong Li and
  • Yamei Xia

26 April 2023

Federated learning has been popular for its ability to train centralized models while protecting clients’ data privacy. However, federated learning is highly susceptible to poisoning attacks, which can result in a decrease in model performance...

  • Article
  • Open Access
2 Citations
1,536 Views
23 Pages

3 February 2025

The classification of the wireless propagation channel between Line-of-Sight (LOS) or Non-Line-of-Sight (NLOS) is useful in the operation of wireless communication systems. The research community has increasingly investigated the application of machi...

  • Article
  • Open Access
1,313 Views
15 Pages

12 April 2024

In this study, we introduce a novel collaborative federated learning (FL) framework, aiming at enhancing robustness in distributed learning environments, particularly pertinent to IoT and industrial automation scenarios. At the core of our contributi...

  • Article
  • Open Access
854 Views
14 Pages

DNS-Sensor: A Sensor-Driven Architecture for Real-Time DNS Cache Poisoning Detection and Mitigation

  • Haisheng Yu,
  • Xuebiao Yuchi,
  • Xue Yang,
  • Hongtao Li,
  • Xingxing Yang and
  • Wei Wang

11 November 2025

The Domain Name System (DNS) is a fundamental component of the Internet, yet its distributed and caching nature makes it susceptible to various attacks, especially cache poisoning. Although the use of random port numbers and transaction IDs has reduc...

  • Article
  • Open Access
1,929 Views
21 Pages

The study investigates how adversarial training techniques can be used to introduce backdoors into deep learning models by an insider with privileged access to training data. The research demonstrates an insider-driven poison-label backdoor approach...

  • Article
  • Open Access
11 Citations
4,184 Views
19 Pages

9 June 2023

Cyber-Physical Systems (CPS) are prone to many security exploitations due to a greater attack surface being introduced by their cyber component by the nature of their remote accessibility or non-isolated capability. Security exploitations, on the oth...

of 4