2021
DOI: 10.1109/jiot.2020.3007130
|View full text |Cite
|
Sign up to set email alerts
|

Deep-Learning-Enabled Security Issues in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
69
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 136 publications
(69 citation statements)
references
References 34 publications
0
69
0
Order By: Relevance
“…e average intersection ratio, defined as the ratio of the intersection and union of the segmentation result and the true value, has the advantages of simplicity and representativeness and is the most commonly used evaluation index. Most studies use the average intersection ratio to measure the semantic segmentation results [38]. e following formula exists:…”
Section: Image Semantic Segmentationmentioning
confidence: 99%
See 1 more Smart Citation
“…e average intersection ratio, defined as the ratio of the intersection and union of the segmentation result and the true value, has the advantages of simplicity and representativeness and is the most commonly used evaluation index. Most studies use the average intersection ratio to measure the semantic segmentation results [38]. e following formula exists:…”
Section: Image Semantic Segmentationmentioning
confidence: 99%
“…It restores the pixel pool based on the information of the largest information pool and restores part of the scanning position upward. e encoder part also uses the same folding method [38]. For each pixel after encoding, the pixel data on different channels are combined with linear parameters without changing the topological structure and dimensional information of the original image [39], thereby expanding and deepening the network structure.…”
Section: Separable Convolutionalmentioning
confidence: 99%
“…(2)Characteristics of IOT 1) Comprehensive perception: there are many types of sensors on the IOT, and each sensor can be said to be an information source, which can capture information of different contents and formats [22]. The IOT through active, passive and other different transmission methods to collect the object data information classification management and analysis, and then accurately transmitted to the data processing system, so as to achieve the IOT era of interconnection [23]. No matter where you are, at any time, you can communicate smoothly.…”
Section: Figure 1application Topology Of Iotmentioning
confidence: 99%
“…proposed for protecting the IoT against advanced attacks [3], [4], [5], [6], [7], [8], [9], [10]. Many of these solutions rely on machine/deep learning to analyze the activities of the IoT devices and the communication traces of the IoT devices.…”
Section: Plenty Of Intrusion Detection Solutions Have Been Latelymentioning
confidence: 99%