Automatic
Speech
Recognition
(ASR)
is
a
crucial
application
of
deep
learning
in
today's
world.
However,
ASR
systems
are
vulnerable
to
attacks
from
malicious
actors
who
can
create
adversarial
examples
fool
the
system
into
producing
incorrect
outputs.
Adversarial
example
detection
techniques
being
developed
mitigate
risk
such
attacks.
This
review
analyzes
effectiveness
various
context
systems.
It
begins
by
explaining
concept
and
their
potential
impact
on
as
well
most
used
evaluation
metrics.
Then,
it
provides
an
overview
different
types
that
be
launched
against
Upon
reading
this
review,
researchers
able
identify
existing
weakness
ASR,
evade
them
future
proposed
schemes.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 73980 - 74010
Published: Jan. 1, 2024
Indoor
localization
(IL)
is
a
significant
topic
of
study
with
several
practical
applications,
particularly
in
the
context
Internet
Things
(IoT)
and
smart
cities.
The
area
IL
has
evolved
greatly
recent
years
due
to
introduction
numerous
technologies
such
as
WiFi,
Bluetooth,
cameras,
other
sensors.
Despite
growing
interest
this
field,
there
are
challenges
drawbacks
that
must
be
addressed
develop
more
accurate
sustainable
systems
for
IL.
This
review
gives
an
in-depth
look
into
IL,
covering
most
promising
artificial
intelligence-based
hybrid
strategies
have
shown
excellent
potential
overcoming
some
limitations
classic
methods
within
IoT
environments.
In
addition,
paper
investigates
significance
high-quality
datasets
evaluation
metrics
design
assessment
algorithms.
Furthermore,
overview
emphasizes
crucial
role
machine
learning
techniques,
deep
transfer
learning,
play
advancement
A
focus
on
importance
various
technologies,
methods,
techniques
being
used
improve
it.
Finally,
survey
highlights
need
continued
research
development
create
scalable
can
applied
across
range
IoT-related
industries,
evacuation-egress
routes,
hazard-crime
detection,
occupancy-driven
energy
reduction
asset
tracking
management.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 43291 - 43307
Published: Jan. 1, 2024
This
work
explores
the
crucial
roles
that
control
theory
and
digital
twins
play
in
enhancing
performance
of
underactuated
quadrotor
unmanned
aerial
vehicles
(QUAVs).
It
describes
how
novel
idea
combined
with
could
alter
operations.
Some
basic
ideas,
such
as
UAV
model,
various
schemes,
innovative
techniques
to
improve
autonomy
QUAV
missions
dynamic
circumstances,
may
also
be
interest
readers.
highlights
recent
developments
presents
a
game-changing
combining
twin
computer
vision,
amalgamating
artificial
intelligence
internet
things
like
elements
sensing
perception
better
for
autonomous
flight
control,
human-UAV
interaction,
energy-efficient
flight,
swarming
UAVs.
The
reader
finally
find
suggestions
applying
understandings
incorporating
technology
boost
its
revolutionary
potential.
Scalable Computing Practice and Experience,
Journal Year:
2024,
Volume and Issue:
25(5), P. 4312 - 4322
Published: Aug. 1, 2024
Botnet
attacks
are
just
one
security
scalability
problem
that
nearly
comes
as
a
default
with
each
and
every
new
IoT
system
launched
into
the
real
world.
devices,
in
particular,
tricky
to
locate
on
network
standard
methods
of
botnet
detection
due
their
inherent
volatility
constraint
developments.
To
this
aim,
we
propose
an
ensemble
method
for
based
transfer
learning
mitigates
those
drawbacks.
The
representation
learning-based
is
used
deliver
domain-adapt
data
between
two
domains
(one
has
traditional
other
contains
devices).
Ensemble
Method
—
This
technique
improves
accuracy
robustness
by
employing
pre-trained
models
customizing
them
target
environment
using
many
working
together.
includes
low-level
base
classifiers
(e.g.,
AlexNet,
VGG16,
inceptionV3,
Mobile
Net)
trained
various
features.
utilize
domain-specific
information
effectively,
authors
investigate
model
stacking
domain
adaptation
strategies.
also
consider
feature
engineering
determine
signatures
behavior
aid
distinguish
normal
device
activities.
perform
extensive
experiments
real-world
datasets
show
efficacy
proposed
approach.
In
comparison
single-model
techniques,
results
considerable
gains
accuracy,
sensitivity,
specificity.
resilient
different
types
circumstances,
making
it
appropriate
real-time
deployment
contexts.
The
rise
of
new
complex
attacks
scenarios
in
Internet
things
(IoT)
environments
necessitate
more
advanced
and
intelligent
cyber
defense
techniques
such
as
various
Intrusion
Detection
Systems
(IDSs)
which
are
responsible
for
detecting
mitigating
malicious
activities
IoT
networks
without
human
intervention.
To
address
this
issue,
deep
reinforcement
learning
(DRL)
has
been
proposed
recent
years,
to
automatically
tackle
intrusions/attacks.
In
paper,
a
comprehensive
survey
DRL-based
IDS
on
is
presented.
Furthermore,
survey,
the
state-of-the-art
methods
have
classified
into
five
categories
including
wireless
sensor
network
(WSN),
Q-network
(DQN),
healthcare,
hybrid,
other
techniques.
addition,
most
crucial
performance
metrics,
namely
accuracy,
recall,
precision,
false
negative
rate
(FNR),
positive
(FPR),
F-measure,
detailed,
order
evaluate
each
method.
paper
provides
summary
datasets
utilized
studies
well.
World Journal of Advanced Research and Reviews,
Journal Year:
2023,
Volume and Issue:
18(3), P. 1207 - 1231
Published: June 27, 2023
Smart
agriculture,
enabled
by
advanced
technologies
such
as
internet
of
things,
artificial
intelligence
and
data
analytics,
offers
immense
potential
for
optimizing
farming
practices
increasing
agricultural
productivity.
However,
the
adoption
smart
agriculture
systems
continues
to
grow,
it
brings
forth
various
security
issues
that
need
be
addressed
protect
operations,
integrity,
privacy.
This
paper
provides
an
overview
in
including
vulnerabilities
things
devices,
lack
standardized
protocols,
limited
awareness
among
farmers,
challenges
securing
communication
networks.
In
addition,
highlights
robust
measures
mitigate
risks
unauthorized
access,
breaches,
disruption
operations.
Moreover,
emphasis
should
laid
on
importance
collaborative
efforts
between
technology
providers,
stakeholders,
researchers,
policymakers
develop
effective
solutions
standards
ensure
trustworthiness
resilience
systems.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 30941 - 30961
Published: Jan. 1, 2024
The
novelty
of
Federated
Learning
(FL)
has
emerged
as
a
promising
alternative
to
centralized
machine
learning
systems
in
the
context
Anomaly-Based
Intrusion
Detection
Systems
(AIDS)
deployed
on
Internet
Things
(IoT)
devices.
Unlike
traditional
models,
FL
allows
on-device
model
training
and
updates,
reducing
privacy
concerns
issues
like
single
points
failure
high
false
alarm
rates
(FAR).
This
approach,
termed
'Fed-AIDS,'
offers
more
secure
efficient
solution.
However,
development
Fed-AIDS
models
faces
challenges
related
limited
data
diverse
nature
IoT
datasets.
Additionally,
FL's
decentralized
introduces
weight
divergence
arising
from
non-Independently
Identically
Distributed
(non-IID)
clients.
To
address
these
optimize
modeling,
interdisciplinary
research
efforts
are
vital.
primary
objective
this
study
is
conduct
an
up-to-date
review
by
adopting
Systematic
Literature
Review
(SLR)
approach
analyze
existing
studies
modeling
procedures
for
Data
published
were
retrieved
Scopus
database,
which
covered
major
publishers
IEEE,
Elsevier
others.
Specifically,
our
conducted
following
perspectives:
workflow
tools,
dataset,
complexities
non-IID
classification
tasks,
aggregation
validation
metrics.
Based
findings,
highlights
series
proposes
potential
solutions
stand
future
aiming
advance
field
device
security.
Indoor
localization
(IL)
is
a
significant
topic
of
study
with
several
practical
applications.
The
area
IL
has
evolved
greatly
in
recent
years
due
to
the
introduction
numerous
technologies
such
as
WiFi,
Bluetooth,
cameras,
and
other
sensors.
Despite
growing
interest
this
field,
there
are
challenges
drawbacks
that
must
be
addressed
develop
more
accurate
sustainable
systems
for
its
real-life
This
review
gives
an
in-depth
look
into
IL,
covering
most
promising
artificial
intelligence-based
hybrid
strategies
have
shown
excellent
potential
overcoming
some
limitations
classic
methods.
In
addition,
paper
investigates
significance
high-quality
datasets
evaluation
metrics
design
assessment
algorithms.
Furthermore,
overview
emphasizes
crucial
role
machine
learning
techniques,
deep
transfer
learning,
play
advancement
IL.
A
focus
on
importance
various
technologies,
methods,
techniques
being
used
improve
it.
Finally,
survey
highlights
need
continued
research
development
create
scalable
can
applied
across
range
industries,
evacuation-egress
routes,
hazard-crime
detection,
smart
occupancy-driven
energy
reduction
asset
tracking
management.