A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Abstract Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. As IoT, AI, and 5G endure to unite and understand the potential of Industry 4.0, security events and incidents on IoT systems have been e...
Saved in:
Main Authors: | Kashi Sai Prasad, P Udayakumar, E. Laxmi Lydia, Mohammed Altaf Ahmed, Mohamad Khairi Ishak, Faten Khalid Karim, Samih M. Mostafa |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2025-01-01
|
Series: | Scientific Reports |
Subjects: | |
Online Access: | https://doi.org/10.1038/s41598-025-85878-3 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
An Adversarial Attack via Penalty Method
by: Jiyuan Sun, et al.
Published: (2025-01-01) -
APDL: an adaptive step size method for white-box adversarial attacks
by: Jiale Hu, et al.
Published: (2025-01-01) -
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
by: Arjun Kumar Bose Arnob, et al.
Published: (2025-02-01) -
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
by: Zohra Rezgui, et al.
Published: (2022-09-01) -
Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks
by: Rizhao Cai, et al.
Published: (2024-10-01)