Securing IoT Devices Using Generative AI Techniques DOI
Azeem Khan, N. Z. Jhanjhi,

Ghassan A. A. Abdulhabeb

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 219 - 264

Published: July 26, 2024

Generative artificial intelligence (GenAI) is a part of which has the ability to generate content in various formats ranging from text videos and images audio formats. GenAI inherently learn large datasets can produce results that be optimal use case cybersecurity. In current digital landscape, we see plethora electronic gadgets connected this seamless network devices online. These were earlier unable connect due lack ip addresses are now able improving quality human life home appliances health domain. From here emergence smart networks at one side boon but same time they have risk exploitation with unexpected cyberattacks. Hence, chapter an effort highlight issues concerning cyberthreats advice on how utilized mitigate these risks. This focused applying generative AI secured IoT devices. By discussing core concepts security, such as device authentication access control, demonstrated next-generation models, including GANs VAEs, boost anomaly detection for security. The also provided examples real-life cases illustrate used optimize energy grid, protect data privacy, strengthen cybersecurity efforts. Additionally, presented key related ethical considerations pertaining bias, accountability development deployment responsible AI. Moreover, it introduced legal aspects privacy legislation, protection, compliance. Finally, outlined some future trends security name few enhanced threat detection, privacy-preserving multimedia processing, secure communications. then encourages organizations start using enable systems become proactive about reduce massive onslaught cyber threats while navigating ever-evolving landscape.

Language: Английский

Addressing 6 challenges in generative AI for digital health: A scoping review DOI Creative Commons
Tara Templin,

Monika W. Perez,

Sean Sylvia

et al.

PLOS Digital Health, Journal Year: 2024, Volume and Issue: 3(5), P. e0000503 - e0000503

Published: May 23, 2024

Generative artificial intelligence (AI) can exhibit biases, compromise data privacy, misinterpret prompts that are adversarial attacks, and produce hallucinations. Despite the potential of generative AI for many applications in digital health, practitioners must understand these tools their limitations. This scoping review pays particular attention to challenges with technologies medical settings surveys solutions. Using PubMed, we identified a total 120 articles published by March 2024, which reference evaluate medicine, from synthesized themes suggestions future work. After first discussing general background on AI, focus collecting presenting 6 key health specific measures be taken mitigate challenges. Overall, bias, hallucination, regulatory compliance were frequently considered, while other concerns around such as overreliance text models, misprompting, jailbreaking, not commonly evaluated current literature.

Language: Английский

Citations

20

Integrating Sensor Technologies with Conversational AI: Enhancing Context-Sensitive Interaction Through Real-Time Data Fusion DOI Creative Commons
Joseph C. Kush

Sensors, Journal Year: 2025, Volume and Issue: 25(1), P. 249 - 249

Published: Jan. 4, 2025

This article examines how sensor technologies (such as environmental sensors, biometric and IoT devices) intersect with conversational AI models like ChatGPT 4.0. In particular, this explores data from different sensors in real time can improve models’ comprehension of surroundings, user contexts, physical conditions. Lastly, delves into the scientific principles supporting technologies, processing methods, their fusion generative such to develop adaptable, dynamic systems that engage humans intelligently time. Some specific topics are investigated include science behind networks acquiring real-time data, analyze generate dialogue is sensitive context, instances healthcare using wearable along chatbots for patient treatment), smart homes (interaction assistants driven by sensors). These subjects will prove advantageous researchers technology well development, showcasing interdisciplinary progress systems.

Language: Английский

Citations

2

A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories DOI Creative Commons

Hannelore Sebestyen,

Daniela Elena Popescu, Doina Zmaranda

et al.

Computers, Journal Year: 2025, Volume and Issue: 14(2), P. 61 - 61

Published: Feb. 11, 2025

With the proliferation of IoT-based applications, security requirements are becoming increasingly stringent. Given diversity such systems, selecting most appropriate solutions and technologies to address challenges is a complex activity. This paper provides an exhaustive evaluation existing related IoT domain, analysing studies published between 2021 2025. review explores evolving landscape security, identifying key focus areas, challenges, proposed as presented in recent research. Through this analysis, categorizes efforts into six main areas: emerging (35.2% studies), securing identity management (19.3%), attack detection (17.9%), data protection (8.3%), communication networking (13.8%), risk (5.5%). These percentages highlight research community’s indicate areas requiring further investigation. From leveraging machine learning blockchain for anomaly real-time threat response optimising lightweight algorithms resource-limited devices, researchers propose innovative adaptive threats. The underscores integration advanced enhance system while also highlighting ongoing challenges. concludes with synthesis threats each identified category, along their solutions, aiming support decision-making during design approach applications guide future toward comprehensive efficient frameworks.

Language: Английский

Citations

1

Navigating the metaverse: A technical review of emerging virtual worlds DOI
H.M.K.K.M.B. Herath, Mamta Mittal, Aman Kataria

et al.

Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery, Journal Year: 2024, Volume and Issue: 14(4)

Published: March 29, 2024

Abstract The metaverse, a burgeoning virtual reality realm, has garnered substantial attention owing to its multifaceted applications. Rapid advancements and widespread acceptance of metaverse technologies have birthed dynamic intricate digital landscape. As various platforms, worlds, social networks within the increase, there is growing imperative for comprehensive analysis implications across societal, technological, business dimensions. Notably, existing review studies have, past decade, primarily overlooked metaverse‐based multidomain approach. A meticulous examination encompassing 207 research delves into technological innovation elucidating future trajectory ethical imperatives. Additionally, article introduces term “ MetaWarria ” conceptualize potential conflicts arising from dynamics. study discerns that healthcare (45%) education (22%) are pivotal sectors steering developments, while entertainment sector (9%) reshapes corporate Artificial intelligence (AI) plays 9% role in enhancing metaverse's marketing user experience. Security, privacy, policy concerns (11%) addressed due escalating threats, yielding practical solutions. underscores profound influence (57%) on phenomenon accelerated by COVID‐19 pandemic. culminates contemplating warfare national security, introducing as conceptual framework such discussions. This categorized under: Application Areas > Health Care Science Technology Fundamental Concepts Data Knowledge Human Centricity User Interaction

Language: Английский

Citations

6

Harnessing Generative AI for Enhanced Web Application Security DOI
Muhammad Usman Tariq

Advances in web technologies and engineering book series, Journal Year: 2024, Volume and Issue: unknown, P. 161 - 192

Published: Sept. 27, 2024

This chapter explores the integration of Generative Artificial Intelligence (AI) in bolstering security Web applications. It delves into how AI-driven techniques can be employed to predict, detect, and mitigate threats real-time, thereby safeguarding Web-based systems from potential vulnerabilities. Through a comprehensive analysis current challenges application AI transform traditional paradigms, this aims provide detailed overview cutting-edge methodologies their implications for future security. The term “advanced web application” signifies improvement fortification electronic against vulnerabilities through utilization AI. In rapidly evolving landscape applications, ensuring robust measures is crucial sensitive data maintaining integrity online systems.

Language: Английский

Citations

4

A Comprehensive Survey on Generative AI for Metaverse: Enabling Immersive Experience DOI
Vinay Chamola, Siva Sai,

A. Bhargava

et al.

Cognitive Computation, Journal Year: 2024, Volume and Issue: unknown

Published: Sept. 4, 2024

Language: Английский

Citations

3

Artificial Intelligence of Things: A Survey DOI Open Access
Md Shakhrul Iman Siam, Hyunho Ahn, Li Liu

et al.

ACM Transactions on Sensor Networks, Journal Year: 2024, Volume and Issue: unknown

Published: Aug. 30, 2024

The integration of the Internet Things (IoT) and modern Artificial Intelligence (AI) has given rise to a new paradigm known as (AIoT). In this survey, we provide systematic comprehensive review AIoT research. We examine literature related sensing, computing, networking & communication, which form three key components AIoT. addition advancements in these areas, domain-specific systems that are designed for various important application domains. have also created an accompanying GitHub repository, where compile papers included survey: https://github.com/AIoT-MLSys-Lab/AIoT-Survey. This repository will be actively maintained updated with research it becomes available. As both IoT AI become increasingly critical our society, believe is emerging essential field at intersection AI. hope survey serve valuable resource those engaged act catalyst future explorations bridge gaps drive exciting field.

Language: Английский

Citations

2

Securing IoT Devices Using Generative AI Techniques DOI
Azeem Khan, N. Z. Jhanjhi,

Ghassan A. A. Abdulhabeb

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 219 - 264

Published: July 26, 2024

Generative artificial intelligence (GenAI) is a part of which has the ability to generate content in various formats ranging from text videos and images audio formats. GenAI inherently learn large datasets can produce results that be optimal use case cybersecurity. In current digital landscape, we see plethora electronic gadgets connected this seamless network devices online. These were earlier unable connect due lack ip addresses are now able improving quality human life home appliances health domain. From here emergence smart networks at one side boon but same time they have risk exploitation with unexpected cyberattacks. Hence, chapter an effort highlight issues concerning cyberthreats advice on how utilized mitigate these risks. This focused applying generative AI secured IoT devices. By discussing core concepts security, such as device authentication access control, demonstrated next-generation models, including GANs VAEs, boost anomaly detection for security. The also provided examples real-life cases illustrate used optimize energy grid, protect data privacy, strengthen cybersecurity efforts. Additionally, presented key related ethical considerations pertaining bias, accountability development deployment responsible AI. Moreover, it introduced legal aspects privacy legislation, protection, compliance. Finally, outlined some future trends security name few enhanced threat detection, privacy-preserving multimedia processing, secure communications. then encourages organizations start using enable systems become proactive about reduce massive onslaught cyber threats while navigating ever-evolving landscape.

Language: Английский

Citations

0