Security and Communication Networks

Machine Learning: the Cybersecurity, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications


Publishing date
01 Aug 2021
Status
Published
Submission deadline
02 Apr 2021

Lead Editor

1Central South University, Changsha, China

2Edinburgh Napier University, Edinburgh, UK

3Hunan University of Science and Engineering, Yongzhou, China

4Shiga University, Hikone, Japan


Machine Learning: the Cybersecurity, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications

Description

In recent years, the collection, processing, and analysis of enterprise, government, and personal data have become greatly convenient and widespread, as the continuous advancement of emerging applications such as Cyber-physical systems, social networks, E-commerce, and 5G Systems. This also makes sensitive information more vulnerable to abuses, and thus secure mechanisms and technologies tailored for emerging applications need to be explored urgently.

Machine learning (ML) has recently gained a renewed interest as the technology powering it has become more widely available and accessible to organizations of all sizes. Applications using machine learning are being deployed in contexts and for purposes that were not even imaginable a few years ago. From a Cybersecurity, Privacy, and Public Safety angle, ML brings about both opportunities and challenges for emerging applications. On the one hand, ML can help interested parties to better protect privacy in challenging situations, improving the state-of-the-art security solutions. On the other hand, ML also presents risks of opaque decision making, biased algorithms, and safety vulnerabilities, challenging traditional notions of privacy protection.

This Special Issue aims to provide a forum for those from academia and industry to communicate their latest results on theoretical advances and industrial case studies that combine ML techniques, such as reinforcement learning, adversarial machine learning, and deep learning, with significant problems in Cybersecurity, Privacy, and Public Safety. Research papers can be focused on offensive and defensive applications of ML to security. Submissions can contemplate original research, serious dataset collection and benchmarking, or critical surveys. Review articles are also welcome.

Potential topics include but are not limited to the following:

  • Security machine learning modelling and architecture
  • Secure multi-party computation techniques for machine learning
  • Attacks against machine learning
  • Machine learning threat intelligence
  • Machine learning for Cybersecurity
  • Machine learning for intrusion detection and response
  • Machine learning for multimedia data security
  • Machine learning for public safety

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 9870129
  • - Editorial

Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications

Kehua Guo | Zhiyuan Tan | ... | Xiaokang Zhou
  • Special Issue
  • - Volume 2021
  • - Article ID 5566423
  • - Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Gaigai Tang | Lin Yang | ... | Huiqiang Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 9994127
  • - Research Article

Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model

Zuguo Chen | Yanglong Liu | ... | Xuzhuo Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 9999398
  • - Research Article

Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety

Sheng Ren | Jianqi Li | ... | Jian Jiang
  • Special Issue
  • - Volume 2021
  • - Article ID 9953509
  • - Research Article

Creating Ensemble Classifiers with Information Entropy Diversity Measure

Jiangbo Zou | Xiaokang Fu | ... | Jingjing Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 9948808
  • - Review Article

Fabric Defect Detection in Textile Manufacturing: A Survey of the State of the Art

Chao Li | Jun Li | ... | Jingjing Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 5518909
  • - Research Article

An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic

Bo Liu | Jinfu Chen | ... | Jingyi Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 6638134
  • - Research Article

Representativeness-Based Instance Selection for Intrusion Detection

Fei Zhao | Yang Xin | ... | Xinxin Niu
  • Special Issue
  • - Volume 2021
  • - Article ID 6693726
  • - Research Article

Fail-Stop Group Signature Scheme

Jonathan Jen-Rong Chen | Yi-Yuan Chiang | ... | Wen-Yen Lin
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.