Security and Communication Networks

Security, Trust, and Privacy in Machine Learning and Internet of Things 2021


Publishing date
01 May 2022
Status
Published
Submission deadline
24 Dec 2021

Lead Editor

1Technical University of Denmark, Kongens Lyngby, Denmark

2Nanjing University of Finance and Economics, Nanjing, China

3New York Institute of Technology, New York, USA

4University of Aizu, Aizuwakamatsu, Japan


Security, Trust, and Privacy in Machine Learning and Internet of Things 2021

Description

The Internet of Things (IoT) allows billions of devices in the physical world as well as virtual environments to exchange data with each other intelligently. For example, smartphones have become an important personal assistant and an indispensable part of people's everyday life and work. Machine learning has now been widely applied to IoT in order to facilitate performance and efficiency, such as reinforcement learning and deep learning. However, machine learning also suffers many issues, which may threaten the security, trust, and privacy of IoT environments and applications. Among these issues, adversarial learning is one major threat, in which attackers may try to fool the learning algorithm with particular training examples, and lead to a false result.

This Special Issue will focus on cutting-edge research from both academia and industry. It aims to solicit original research and review articles with a particular emphasis on discussing the security, trust, and privacy challenges in machine learning and relevant IoT applications.

Potential topics include but are not limited to the following:

  • Machine learning-based intrusion detection
  • Privacy attacks including machine learning-based attacks
  • Blockchain in IoT and machine learning
  • Intrusion detection techniques
  • Secure data collection with machine learning-based IoT
  • IoT privacy and anonymity with machine learning and forensics techniques
  • Trust management with machine learning for IoT applications
  • Applications of machine learning in IoT security, trust, and privacy
  • Vulnerability assessment in machine learning-based IoT
  • Secure routing in machine learning-based IoT
  • Adversarial learning for IoT

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 9896689
  • - Research Article

Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles

Letian Fang | Chunshang Wu | ... | Jun Ye
  • Special Issue
  • - Volume 2022
  • - Article ID 8398591
  • - Research Article

FGL_Droid: An Efficient Android Malware Detection Method Based on Hybrid Analysis

Weiping Wang | Congmin Ren | ... | Pengfei Liu
  • Special Issue
  • - Volume 2022
  • - Article ID 4748528
  • - Research Article

An Enhanced Intrusion Detection System for IoT Networks Based on Deep Learning and Knowledge Graph

Xiuzhang Yang | Guojun Peng | ... | Yangqi Lv
  • Special Issue
  • - Volume 2022
  • - Article ID 4196945
  • - Research Article

Automating Group Management of Large-Scale IoT Botnets for Antitracking

Pengyu Pan | Xiaobo Ma | ... | Feitong Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 4593002
  • - Research Article

Natural Backdoor Attacks on Deep Neural Networks via Raindrops

Feng Zhao | Li Zhou | ... | Leo Yu Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 4835776
  • - Research Article

GAN-Based Information Leakage Attack Detection in Federated Learning

Jianxiong Lai | Xiuli Huang | ... | Jingyu Hua
  • Special Issue
  • - Volume 2022
  • - Article ID 4769187
  • - Research Article

Blockchain-Based Privacy-Preserving Vaccine Passport System

Yangzhou Cao | Jiageng Chen | Yajun Cao
  • Special Issue
  • - Volume 2022
  • - Article ID 1443978
  • - Research Article

IoT-DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning

Jin Wang | Chang Liu | ... | Jing Zhong
  • Special Issue
  • - Volume 2022
  • - Article ID 1862888
  • - Review Article

Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges

Naeem Ahmed | Rashid Amin | ... | Tariq Shah
  • Special Issue
  • - Volume 2022
  • - Article ID 3306098
  • - Research Article

A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic

Yuchen Sun | Xiangyang Luo | ... | Zhaorui Ma
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.