Security and Communication Networks

Security, Trust, and Privacy in Machine Learning and Internet of Things 2021


Publishing date
01 May 2022
Status
Published
Submission deadline
24 Dec 2021

Lead Editor

1Technical University of Denmark, Kongens Lyngby, Denmark

2Nanjing University of Finance and Economics, Nanjing, China

3New York Institute of Technology, New York, USA

4University of Aizu, Aizuwakamatsu, Japan


Security, Trust, and Privacy in Machine Learning and Internet of Things 2021

Description

The Internet of Things (IoT) allows billions of devices in the physical world as well as virtual environments to exchange data with each other intelligently. For example, smartphones have become an important personal assistant and an indispensable part of people's everyday life and work. Machine learning has now been widely applied to IoT in order to facilitate performance and efficiency, such as reinforcement learning and deep learning. However, machine learning also suffers many issues, which may threaten the security, trust, and privacy of IoT environments and applications. Among these issues, adversarial learning is one major threat, in which attackers may try to fool the learning algorithm with particular training examples, and lead to a false result.

This Special Issue will focus on cutting-edge research from both academia and industry. It aims to solicit original research and review articles with a particular emphasis on discussing the security, trust, and privacy challenges in machine learning and relevant IoT applications.

Potential topics include but are not limited to the following:

  • Machine learning-based intrusion detection
  • Privacy attacks including machine learning-based attacks
  • Blockchain in IoT and machine learning
  • Intrusion detection techniques
  • Secure data collection with machine learning-based IoT
  • IoT privacy and anonymity with machine learning and forensics techniques
  • Trust management with machine learning for IoT applications
  • Applications of machine learning in IoT security, trust, and privacy
  • Vulnerability assessment in machine learning-based IoT
  • Secure routing in machine learning-based IoT
  • Adversarial learning for IoT

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5203217
  • - Research Article

Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization

Xue Yuan | Guanjun Lin | ... | Jun Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 6568602
  • - Research Article

TapChain: A Rule Chain Recognition Model Based on Multiple Features

Keyu Jiang | Hanyi Zhang | ... | Zhe Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 2713211
  • - Research Article

Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic

Feihong Yin | Li Yang | ... | Jiahao Dai
  • Special Issue
  • - Volume 2021
  • - Article ID 2610887
  • - Research Article

Image Speckle Denoising for Securing Internet of Smart Sensors

Wei Ma | Zhihui Xin | ... | Jun Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 6234409
  • - Research Article

EPCT: An Efficient Privacy-Preserving and Collusion-Resisting Top- Query Processing in WSNs

Qian Zhou | Hua Dai | ... | Xun Yi
  • Special Issue
  • - Volume 2021
  • - Article ID 9430132
  • - Research Article

BCEAD: A Blockchain-Empowered Ensemble Anomaly Detection for Wireless Sensor Network via Isolation Forest

Xiong Yang | Yuling Chen | ... | Xiao Lv
  • Special Issue
  • - Volume 2021
  • - Article ID 3116593
  • - Review Article

Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks

Chien-Ming Chen | Zhen Li | ... | Long Li
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.