Adversarial Example Detection Techniques in Speech Recognition Systems: A review DOI

Khalid Noureddine,

Hamza Kheddar, Mohamed Maazouz

et al.

Published: Nov. 28, 2023

Automatic Speech Recognition (ASR) is a crucial application of deep learning in today's world. However, ASR systems are vulnerable to attacks from malicious actors who can create adversarial examples fool the system into producing incorrect outputs. Adversarial example detection techniques being developed mitigate risk such attacks. This review analyzes effectiveness various context systems. It begins by explaining concept and their potential impact on as well most used evaluation metrics. Then, it provides an overview different types that be launched against Upon reading this review, researchers able identify existing weakness ASR, evade them future proposed schemes.

Language: Английский

Deep transfer learning for automatic speech recognition: Towards better generalization DOI
Hamza Kheddar, Yassine Himeur, Somaya Al-Máadeed

et al.

Knowledge-Based Systems, Journal Year: 2023, Volume and Issue: 277, P. 110851 - 110851

Published: July 29, 2023

Language: Английский

Citations

67

Uncovering the Potential of Indoor Localization: Role of Deep and Transfer Learning DOI Creative Commons
Oussama Kerdjidj, Yassine Himeur, Shahab Saquib Sohail

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 73980 - 74010

Published: Jan. 1, 2024

Indoor localization (IL) is a significant topic of study with several practical applications, particularly in the context Internet Things (IoT) and smart cities. The area IL has evolved greatly recent years due to introduction numerous technologies such as WiFi, Bluetooth, cameras, other sensors. Despite growing interest this field, there are challenges drawbacks that must be addressed develop more accurate sustainable systems for IL. This review gives an in-depth look into IL, covering most promising artificial intelligence-based hybrid strategies have shown excellent potential overcoming some limitations classic methods within IoT environments. In addition, paper investigates significance high-quality datasets evaluation metrics design assessment algorithms. Furthermore, overview emphasizes crucial role machine learning techniques, deep transfer learning, play advancement A focus on importance various technologies, methods, techniques being used improve it. Finally, survey highlights need continued research development create scalable can applied across range IoT-related industries, evacuation-egress routes, hazard-crime detection, occupancy-driven energy reduction asset tracking management.

Language: Английский

Citations

11

Digital Twins and Control Theory: A Critical Review on Revolutionizing Quadrotor UAVs DOI Creative Commons
Ghulam E Mustafa Abro, Ayman M. Abdallah

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 43291 - 43307

Published: Jan. 1, 2024

This work explores the crucial roles that control theory and digital twins play in enhancing performance of underactuated quadrotor unmanned aerial vehicles (QUAVs). It describes how novel idea combined with could alter operations. Some basic ideas, such as UAV model, various schemes, innovative techniques to improve autonomy QUAV missions dynamic circumstances, may also be interest readers. highlights recent developments presents a game-changing combining twin computer vision, amalgamating artificial intelligence internet things like elements sensing perception better for autonomous flight control, human-UAV interaction, energy-efficient flight, swarming UAVs. The reader finally find suggestions applying understandings incorporating technology boost its revolutionary potential.

Language: Английский

Citations

9

Fake news detection in Dravidian languages using transfer learning with adaptive finetuning DOI
Eduri Raja, Badal Soni, Samir Kumar Borgohain

et al.

Engineering Applications of Artificial Intelligence, Journal Year: 2023, Volume and Issue: 126, P. 106877 - 106877

Published: Aug. 9, 2023

Language: Английский

Citations

16

Ensemble Transfer Learning for Botnet Detection in the Internet of Things DOI Open Access

Ali Aalsaud,

Shahab Wahhab Kareem, Raghad Zuhair Yousif

et al.

Scalable Computing Practice and Experience, Journal Year: 2024, Volume and Issue: 25(5), P. 4312 - 4322

Published: Aug. 1, 2024

Botnet attacks are just one security scalability problem that nearly comes as a default with each and every new IoT system launched into the real world. devices, in particular, tricky to locate on network standard methods of botnet detection due their inherent volatility constraint developments. To this aim, we propose an ensemble method for based transfer learning mitigates those drawbacks. The representation learning-based is used deliver domain-adapt data between two domains (one has traditional other contains devices). Ensemble Method — This technique improves accuracy robustness by employing pre-trained models customizing them target environment using many working together. includes low-level base classifiers (e.g., AlexNet, VGG16, inceptionV3, Mobile Net) trained various features. utilize domain-specific information effectively, authors investigate model stacking domain adaptation strategies. also consider feature engineering determine signatures behavior aid distinguish normal device activities. perform extensive experiments real-world datasets show efficacy proposed approach. In comparison single-model techniques, results considerable gains accuracy, sensitivity, specificity. resilient different types circumstances, making it appropriate real-time deployment contexts.

Language: Английский

Citations

3

Deep Reinforcement Learning for Intrusion Detection in IoT: A Survey DOI

Afrah Gueriani,

Hamza Kheddar, Ahmed Cherif Mazari

et al.

Published: Nov. 28, 2023

The rise of new complex attacks scenarios in Internet things (IoT) environments necessitate more advanced and intelligent cyber defense techniques such as various Intrusion Detection Systems (IDSs) which are responsible for detecting mitigating malicious activities IoT networks without human intervention. To address this issue, deep reinforcement learning (DRL) has been proposed recent years, to automatically tackle intrusions/attacks. In paper, a comprehensive survey DRL-based IDS on is presented. Furthermore, survey, the state-of-the-art methods have classified into five categories including wireless sensor network (WSN), Q-network (DQN), healthcare, hybrid, other techniques. addition, most crucial performance metrics, namely accuracy, recall, precision, false negative rate (FNR), positive (FPR), F-measure, detailed, order evaluate each method. paper provides summary datasets utilized studies well.

Language: Английский

Citations

8

An extensive survey of smart agriculture technologies: Current security posture DOI Creative Commons

Martin Otieno

World Journal of Advanced Research and Reviews, Journal Year: 2023, Volume and Issue: 18(3), P. 1207 - 1231

Published: June 27, 2023

Smart agriculture, enabled by advanced technologies such as internet of things, artificial intelligence and data analytics, offers immense potential for optimizing farming practices increasing agricultural productivity. However, the adoption smart agriculture systems continues to grow, it brings forth various security issues that need be addressed protect operations, integrity, privacy. This paper provides an overview in including vulnerabilities things devices, lack standardized protocols, limited awareness among farmers, challenges securing communication networks. In addition, highlights robust measures mitigate risks unauthorized access, breaches, disruption operations. Moreover, emphasis should laid on importance collaborative efforts between technology providers, stakeholders, researchers, policymakers develop effective solutions standards ensure trustworthiness resilience systems.

Language: Английский

Citations

7

Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices DOI Creative Commons
Umar Isma’ila Audi, Kamaluddeen Usman Danyaro, Aminu Aminu Muazu

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 30941 - 30961

Published: Jan. 1, 2024

The novelty of Federated Learning (FL) has emerged as a promising alternative to centralized machine learning systems in the context Anomaly-Based Intrusion Detection Systems (AIDS) deployed on Internet Things (IoT) devices. Unlike traditional models, FL allows on-device model training and updates, reducing privacy concerns issues like single points failure high false alarm rates (FAR). This approach, termed 'Fed-AIDS,' offers more secure efficient solution. However, development Fed-AIDS models faces challenges related limited data diverse nature IoT datasets. Additionally, FL's decentralized introduces weight divergence arising from non-Independently Identically Distributed (non-IID) clients. To address these optimize modeling, interdisciplinary research efforts are vital. primary objective this study is conduct an up-to-date review by adopting Systematic Literature Review (SLR) approach analyze existing studies modeling procedures for Data published were retrieved Scopus database, which covered major publishers IEEE, Elsevier others. Specifically, our conducted following perspectives: workflow tools, dataset, complexities non-IID classification tasks, aggregation validation metrics. Based findings, highlights series proposes potential solutions stand future aiming advance field device security.

Language: Английский

Citations

2

Uncovering the Potential of Indoor Localization: Role of Deep and Transfer Learning DOI Open Access
Oussama Kerdjidj, Yassine Himeur, Shahab Saquib Sohail

et al.

Published: June 30, 2023

Indoor localization (IL) is a significant topic of study with several practical applications. The area IL has evolved greatly in recent years due to the introduction numerous technologies such as WiFi, Bluetooth, cameras, and other sensors. Despite growing interest this field, there are challenges drawbacks that must be addressed develop more accurate sustainable systems for its real-life This review gives an in-depth look into IL, covering most promising artificial intelligence-based hybrid strategies have shown excellent potential overcoming some limitations classic methods. In addition, paper investigates significance high-quality datasets evaluation metrics design assessment algorithms. Furthermore, overview emphasizes crucial role machine learning techniques, deep transfer learning, play advancement IL. A focus on importance various technologies, methods, techniques being used improve it. Finally, survey highlights need continued research development create scalable can applied across range industries, evacuation-egress routes, hazard-crime detection, smart occupancy-driven energy reduction asset tracking management.

Language: Английский

Citations

5

Investigation on Datasets Toward Intelligent Intrusion Detection Systems for Intra and Inter-Uavs Communication Systems DOI
Ahmed Burhan Mohammed, Lamia Chaari Fourati

Published: Jan. 1, 2024

Language: Английский

Citations

1