2023
DOI: 10.1016/j.compeleceng.2023.108651
|View full text |Cite
|
Sign up to set email alerts
|

Federated deep learning for anomaly detection in the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Te authors discussed its applicability to edge computing and caching, spectrum management, and 5G core networks. Te authors of [19][20][21] used federated learning to detect malware and anomalies in Internet of Tings (IoT) networks and devices. As is evident, federated learning has been utilized in numerous areas; however, its potential for future telecommunication network security, such as 5G, is yet to be explored.…”
Section: Federatedmentioning
confidence: 99%
“…Te authors discussed its applicability to edge computing and caching, spectrum management, and 5G core networks. Te authors of [19][20][21] used federated learning to detect malware and anomalies in Internet of Tings (IoT) networks and devices. As is evident, federated learning has been utilized in numerous areas; however, its potential for future telecommunication network security, such as 5G, is yet to be explored.…”
Section: Federatedmentioning
confidence: 99%
“…We have only included studies (including technical articles and excluding review-type articles) focused on both areas. Table 7 summarizes the methodologies and results of the applications [115][116][117][118][119][120][121][122][123][124][125][126][127].…”
Section: Recent Cps and Iot Applicationsmentioning
confidence: 99%
“…To ensure an up-to-date discussion, only works published in 2023 were included in Table 7. In general, existing works have tackled CPS and IoT applications using classification [115,[118][119][120][121][122][123][124]127], regression [125], and deep learning [118][119][120][121][122]126] approaches. More investigations can be conducted using clustering, transfer learning, and data generation algorithms.…”
Section: Recent Cps and Iot Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…This reduces the amount of work that people have to do and makes the digital world easier to access, more productive, and easier to control. Because the IoT ecosystem is made up of many different types of devices, it is very vulnerable to cyberattacks that take advantage of the system’s weaknesses to stop it from working [ 2 , 3 ]. Cyber threats are getting more complex and dangerous, and the IoT infrastructure is proliferating [ 4 , 5 ].…”
Section: Introductionmentioning
confidence: 99%